benheise / ANGRYORCHARD
A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.
☆26Updated 2 years ago
Alternatives and similar repositories for ANGRYORCHARD:
Users that are interested in ANGRYORCHARD are comparing it to the libraries listed below
- Finding Truth in the Shadows☆89Updated 2 years ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆51Updated 2 years ago
- ☆59Updated 2 years ago
- An example of how to use Microsoft Windows Warbird technology☆27Updated last year
- A native Windows library for intercepting kernel-to-user transitions using instrumentation callbacks☆17Updated last year
- ☆14Updated last year
- ☆12Updated 2 years ago
- UEFI bootkit: Hardware Implant. In-Progress☆13Updated 3 years ago
- WinHvShellcodeEmulator (WHSE) is a shellcode emulator leveraging the Windows Hypervisor Platform API☆22Updated 2 years ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆28Updated 2 years ago
- ☆107Updated 2 years ago
- ☆23Updated last year
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆34Updated last year
- ☆26Updated 3 years ago
- PoC exploit for HP Hardware Diagnostic's EtdSupp driver☆50Updated last year
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆39Updated 4 months ago
- Enumerate Callbacks and all Object Types☆13Updated 2 years ago
- ☆25Updated 2 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆56Updated 3 years ago
- SoulExtraction is a windows driver library for extracting cert information in windows drivers☆22Updated 2 years ago
- Monitors ETW for security relevant syscalls maintaining the set called by each unique process☆73Updated last year
- A Practical example of ELAM (Early Launch Anti-Malware)☆32Updated 3 years ago
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Updated 3 years ago
- A few examples of how to trap virtual memory access on Windows.☆28Updated 3 months ago
- ☆37Updated last month
- ☆29Updated last year
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆97Updated last year
- Report and exploit of CVE-2024-21305.☆35Updated last year
- Repository of Microsoft Driver Block Lists based off of OS-builds☆39Updated 11 months ago