Leksa667 / Vulnerable-Driver-Manual-MapperLinks
This repository contains C++ code to load custom drivers by exploiting a vulnerable driver in Windows. This project demonstrates a technique to bypass DSE (Driver Signature Enforcement) and PatchGuard using a vulnerable driver, and to load a custom driver. It serves as a proof of concept for security research purposes.
☆13Updated 2 months ago
Alternatives and similar repositories for Vulnerable-Driver-Manual-Mapper
Users that are interested in Vulnerable-Driver-Manual-Mapper are comparing it to the libraries listed below
Sorting:
- manual map unsigned driver over signed memory☆202Updated last year
- DSE & PG bypass via BYOVD attack☆64Updated 2 months ago
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆34Updated last year
- This is an EfiGuard BootLoader that can boot EfiGuard from Usermode with no USB or Setup as a Single Executable with automatic File Dumpi…☆61Updated last week
- Experiment with PAGE_GUARD protection to hide memory from other processes☆51Updated last year
- IoCreateDriver Implementation, it can be handful if you're trying to bypass anticheats☆101Updated 4 months ago
- ☆155Updated last year
- Kernel<->Usermode shared memory communcation using manually mapped driver☆23Updated 3 years ago
- browse microsoft driver server for potentially vulnerable drivers☆23Updated last year
- ntoskrnl .data hooks for UM-KM communication☆51Updated last year
- ☆82Updated last year
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆70Updated 2 years ago
- A simple tool to assemble shellcode ready to be copy-pasted into code☆68Updated 3 years ago
- nmi stackwalking + module verification☆133Updated last year
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆96Updated 2 years ago
- Dumping processes using a kernel-mode driver.☆20Updated 3 years ago
- driver manual mapper powered by https://github.com/estimated1337/lenovo_exec☆111Updated 2 years ago
- load unsigned kernel-driver by patching dse in 248 lines☆133Updated last year
- A Kernel Driver that can be used for a cheat or malware base to circumvent common cache & structure table checks. PsLoadedModuleList howe…☆166Updated last week
- ☆26Updated 11 months ago
- ☆58Updated 3 years ago
- Kernel Level NMI Callback Blocker☆123Updated last week
- An advanced DKOM for drivers with "DRIVER_OBJECT"☆20Updated 2 years ago
- base for testing☆174Updated last year
- Translate virtual addresses to physical addresses from usermode.☆53Updated last year
- ☆10Updated 3 years ago
- TS-Changer - Forces the machine in/out of TestSigning Mode at runtime.☆64Updated 2 years ago
- The sequel to Voyager☆75Updated last year
- Hygieia, a vulnerable driver traces scanner written in C++ as an x64 Windows kernel driver.☆147Updated 3 years ago
- Unknowncheats Magically Optimized Tidy Mapper using nvaudio☆137Updated last year