exploitdb
WORKING POC
VERIFIED
by Metasploit · rubylocalwindows
https://www.exploit-db.com/exploits/45653
This Metasploit module exploits CVE-2018-8120, a Win32k NULL pointer dereference vulnerability in Windows 7 and Server 2008 R2, allowing local privilege escalation to kernel mode. It includes architecture-specific payloads and handles both x86 and x64 targets.
Classification
Working Poc 100%
Target:
Windows 7, Windows Server 2008 R2
Auth required
Prerequisites:
Local access to the target system · Meterpreter session
nomisec
WORKING POC
500 stars
by rip1s · local
https://github.com/rip1s/CVE-2018-8120
This is a working proof-of-concept exploit for CVE-2018-8120, a Windows kernel vulnerability in win32k.sys. The exploit leverages a race condition to achieve local privilege escalation (LPE) by manipulating kernel objects and token structures.
Classification
Working Poc 95%
Target:
Microsoft Windows (win32k.sys)
Auth required
Prerequisites:
Local access to a vulnerable Windows system · Administrative or SYSTEM privileges to load kernel drivers
nomisec
WORKING POC
297 stars
by alpha1ab · local
https://github.com/alpha1ab/CVE-2018-8120
This is a working proof-of-concept exploit for CVE-2018-8120, a Windows kernel vulnerability. The code demonstrates a local privilege escalation (LPE) by manipulating kernel structures to elevate privileges to SYSTEM.
Classification
Working Poc 95%
Target:
Microsoft Windows (affects multiple versions, including Windows 7 and Windows 10)
Auth required
Prerequisites:
Local access to the target system · Ability to execute arbitrary code on the target system
nomisec
WORKING POC
164 stars
by bigric3 · local
https://github.com/bigric3/cve-2018-8120
This is a working exploit PoC for CVE-2018-8120, a Windows kernel privilege escalation vulnerability. The code leverages a double-free bug to escalate privileges to SYSTEM by manipulating kernel structures and token references.
Classification
Working Poc 95%
Target:
Windows 7 SP1 x86
No auth needed
Prerequisites:
Windows 7 SP1 x86 system · Local access to the target machine
nomisec
WORKING POC
5 stars
by ne1llee · poc
https://github.com/ne1llee/cve-2018-8120
This PowerShell script exploits CVE-2018-8120, a Windows kernel vulnerability, by manipulating GDI objects to achieve local privilege escalation (LPE). It leverages bitmap handling and memory corruption to escalate privileges from a low-integrity process.
Classification
Working Poc 95%
Target:
Microsoft Windows (kernel)
No auth needed
Prerequisites:
Local access to a vulnerable Windows system · Execution policy allowing PowerShell scripts
nomisec
WORKING POC
2 stars
by EVOL4 · poc
https://github.com/EVOL4/CVE-2018-8120
This is a working exploit for CVE-2018-8120, a Windows kernel vulnerability that allows local privilege escalation by manipulating the GDT (Global Descriptor Table) via a call gate. The exploit uses NtUserSetImeInfoEx to trigger the vulnerability and escalate privileges to SYSTEM.
Classification
Working Poc 95%
Target:
Microsoft Windows (versions 3-6, including Windows 7 and Windows Server 2008)
No auth needed
Prerequisites:
Local access to the target system · Administrative privileges not required
nomisec
WORKING POC
1 stars
by ozkanbilge · local
https://github.com/ozkanbilge/CVE-2018-8120
This is a working exploit for CVE-2018-8120, a Windows kernel vulnerability in win32k.sys. The exploit leverages a race condition to achieve local privilege escalation (LPE) by overwriting kernel memory to escalate privileges to SYSTEM.
Classification
Working Poc 95%
Target:
Microsoft Windows (win32k.sys), versions including Windows 7 and Windows Server 2008
Auth required
Prerequisites:
Local access to the target system · Administrative or user-level access to execute the exploit
gitlab
WORKING POC
by cy.py3.io · poc
https://gitlab.com/cy.py3.io/cve-2018-8120
This repository contains a functional exploit for CVE-2018-8120, a Windows kernel vulnerability. The exploit leverages a double-free condition to achieve local privilege escalation (LPE) by manipulating kernel structures and token stealing.
Classification
Working Poc 95%
Target:
Windows 7 SP1 x86
No auth needed
Prerequisites:
Windows 7 SP1 x86 system · Local access to the target machine
github
WORKING POC
by AmazingOut · cpoc
https://github.com/AmazingOut/CVE_POC/tree/main/CVE-2018-8120
This repository contains a functional exploit for CVE-2018-8120, a Windows kernel vulnerability in win32k.sys. The exploit leverages bitmap object manipulation to achieve arbitrary read/write in kernel memory, ultimately escalating privileges by overwriting the HalDispatchTable to execute shellcode.
Classification
Working Poc 95%
Target:
Microsoft Windows 7 (x64 and x86)
No auth needed
Prerequisites:
Windows 7 environment · ability to execute arbitrary code at user level
nomisec
STUB
by StartZYP · poc
https://github.com/StartZYP/CVE-2018-8120
The repository contains only minimal placeholder code with no functional exploit implementation. The files include empty or near-empty C++ files referencing a non-existent 'test.h' header.
Target:
Unknown (CVE-2018-8120 is a Win32k privilege escalation vulnerability)
No auth needed
nomisec
WORKING POC
by Y0n0Y · poc
https://github.com/Y0n0Y/cve-2018-8120-exp
This repository contains a functional exploit for CVE-2018-8120, a Windows kernel vulnerability in win32k.sys. The exploit leverages bitmap manipulation and arbitrary read/write primitives to achieve local privilege escalation (LPE) on Windows 7 SP1 systems.
Classification
Working Poc 95%
Target:
Microsoft Windows 7 SP1 (x86 and x64)
No auth needed
Prerequisites:
Windows 7 SP1 system · Local access to the target machine
nomisec
WORKING POC
by qiantu88 · poc
https://github.com/qiantu88/CVE-2018-8120
This is a working exploit PoC for CVE-2018-8120, a Windows kernel vulnerability in win32k.sys. The exploit leverages a race condition to achieve local privilege escalation (LPE) by manipulating GDI objects and token stealing.
Classification
Working Poc 90%
Target:
Microsoft Windows (win32k.sys)
Auth required
Prerequisites:
Local access to a vulnerable Windows system · Administrative or SYSTEM privileges to load kernel modules
patchapalooza
WORKING POC
by mirrors_unamer · poc
https://gitee.com/mirrors_unamer/CVE-2018-8120
This repository contains a functional local privilege escalation (LPE) exploit for CVE-2018-8120, targeting Windows systems via a vulnerability in the win32k.sys driver. The exploit includes shellcode for token stealing and is tested on multiple Windows 7 and Windows Server 2008 variants.
Classification
Working Poc 95%
Target:
Microsoft Windows (win32k.sys)
No auth needed
Prerequisites:
Windows 7 or Windows Server 2008 (x32/x64)
patchapalooza
WORKING POC
by mirrors_alpha1ab · poc
https://gitee.com/mirrors_alpha1ab/CVE-2018-8120
This repository contains a functional local privilege escalation (LPE) exploit for CVE-2018-8120, targeting Windows systems (Win7, Win2008, WinXP, Win2003). The exploit leverages a vulnerability in the Windows kernel to escalate privileges by manipulating the token of the SYSTEM process.
Classification
Working Poc 95%
Target:
Microsoft Windows (multiple versions)
No auth needed
Prerequisites:
Local access to a vulnerable Windows system
patchapalooza
WRITEUP
by Ascotbe · local
https://github.com/Ascotbe/Kernelhub
This repository contains documentation and configuration scripts for a collection of Windows kernel exploits, including CVE-2008-1084. It includes README files with technical details and a Python script for generating documentation, but no functional exploit code for CVE-2018-8120.
Classification
Writeup 90%
Target:
Windows Kernel
No auth needed
Prerequisites:
access to the repository · Python environment for documentation generation
patchapalooza
WORKING POC
by yjhcf · poc
https://gitee.com/yjhcf/CVE-2018-8120
This repository contains a functional local privilege escalation (LPE) exploit for CVE-2018-8120, targeting Windows systems (Win7, Win2008, WinXP, Win2003). The exploit leverages a vulnerability in the Windows kernel to escalate privileges by manipulating the EPROCESS token structure.
Classification
Working Poc 95%
Target:
Microsoft Windows (various versions)
No auth needed
Prerequisites:
Local access to a vulnerable Windows system