CVE-2024-35250 PoC - Optimized & Condensed Form of Varwara's PoC# GiveMeKernel
This repository contains a condensed and optimized proof-of-concept (PoC) exploit for **CVE-2024-35250**. The code is a streamlined version of Varwara's original PoC, refactored for efficiency, reduced verbosity, and improved maintainability. This optimized version removes unnecessary debug print statements and redundant code blocks while preserving the core exploit functionality.
> **Disclaimer:**
> This PoC is for educational and research purposes only. Use it responsibly and only on systems you own or have explicit permission to test. The author is not responsible for any misuse or damage caused by this code.
## Changes and Optimizations
- **Code Condensation:**
The code has been refactored to reduce redundancy by combining similar conditional branches and removing repetitive sections.
- **Removed Debug Output:**
All `printf` statements have been removed to reduce noise and improve execution efficiency --
- **Type and Function Adjustments:**
- Corrected type mismatches, especially in string comparisons (e.g., switching from wide-character to ANSI strings in process enumeration).
- Maintained core functionality with standard Windows API calls and ensured compatibility across various Windows versions.
- **Refined Process Handling:**
Optimized memory allocation and API calls for operations like enumerating processes, obtaining kernel module addresses, and writing to virtual memory.
## Prerequisites
- Windows version 10.0.10240 – 10.0.25398
[4.0K] /data/pocs/aebd8e39b6c92fb6cfbf6252cd0adf7c6085a3d9
├── [4.0K] GiveMeKernel.cpp
├── [9.6K] Helpers.h
└── [1.5K] README.md
0 directories, 3 files