DriverHunter / Win-Driver-EXPLinks
This repo contains EXPs about Vulnerable Windows Driver
☆47Updated last year
Alternatives and similar repositories for Win-Driver-EXP
Users that are interested in Win-Driver-EXP are comparing it to the libraries listed below
Sorting:
- ☆24Updated last year
- ☆64Updated 2 years ago
- A serie of exploits targeting eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆113Updated 3 months ago
- PoC exploit for HP Hardware Diagnostic's EtdSupp driver☆50Updated 2 years ago
- Finding Truth in the Shadows☆120Updated 3 years ago
- Remove WPP calls from hexrays decompiled code☆55Updated last week
- LPE exploit for CVE-2023-36802☆24Updated 2 years ago
- Repo with different exploits & PoCs☆66Updated 8 months ago
- Windows KASLR bypass using prefetch side-channel☆174Updated last year
- windows rootkit☆60Updated last year
- Exploitable drivers, you know what I mean☆153Updated 2 months ago
- Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool☆300Updated 2 months ago
- WinDbg plugin to trace module transitions from a debugged driver.☆38Updated last month
- HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion☆65Updated 9 months ago
- ☆93Updated last year
- An extended proof-of-concept for the CVE-2021-21551 Dell ‘dbutil_2_3.sys’ Kernel Exploit☆24Updated 4 years ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆79Updated 3 years ago
- Minifilter Callback Patching Proof-of-Concept☆73Updated 3 years ago
- A few examples of how to trap virtual memory access on Windows.☆39Updated last year
- ☆21Updated last year
- Walks the CFG bitmap to find previously executable but currently hidden shellcode regions☆130Updated 2 years ago
- Hook all callbacks which are registered with LdrRegisterDllNotification☆96Updated 10 months ago
- Report and exploit of CVE-2023-36427☆90Updated 2 years ago
- A simple but useful project maybe help you reverse Windows.☆41Updated last year
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆58Updated 4 years ago
- ☆118Updated 3 years ago
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆36Updated 9 months ago
- Analysis of the vulnerability☆50Updated 2 years ago
- Exploiting the KsecDD Windows driver through Server Silos☆74Updated last year
- Report and exploit of CVE-2024-21305.☆38Updated 2 years ago