heyheysky / vulnerable-driverLinks
☆18Updated 9 months ago
Alternatives and similar repositories for vulnerable-driver
Users that are interested in vulnerable-driver are comparing it to the libraries listed below
Sorting:
- This repo contains EXPs about Vulnerable Windows Driver☆47Updated last year
- Exploits targeting eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆105Updated this week
- An x86-64 code virtualizer for VM based obfuscation☆139Updated 10 months ago
- ☆61Updated 2 years ago
- Windows 11 24H2 Runtime PatchGuard Bypass☆199Updated last week
- PoC exploit for HP Hardware Diagnostic's EtdSupp driver☆50Updated 2 years ago
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆58Updated last year
- windows rootkit☆61Updated last year
- bootkit驱动映射,三环进程注入加载指定模块☆15Updated last year
- spoof return address☆77Updated 2 years ago
- X86 Packer with Portable Executable compatibility.☆59Updated 2 months ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆129Updated 2 years ago
- An improved version of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆72Updated 6 months ago
- Hook all callbacks which are registered with LdrRegisterDllNotification☆90Updated 6 months ago
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆128Updated last year
- NtCreateUserProcess with CsrClientCallServer for mainstream Windows x64 version☆32Updated last year
- An extended proof-of-concept for the CVE-2021-21551 Dell ‘dbutil_2_3.sys’ Kernel Exploit☆24Updated 4 years ago
- DSE & PG bypass via BYOVD attack☆64Updated 3 months ago
- Finding Truth in the Shadows☆115Updated 2 years ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆76Updated 2 years ago
- kASLR bypass technique on Intel CPUs.☆30Updated 5 months ago
- PoC Anti-Rootkit/Anti-Cheat Driver.☆221Updated 5 months ago
- Walks the CFG bitmap to find previously executable but currently hidden shellcode regions☆124Updated 2 years ago
- Heaven's Gate implementation in C for constructing x64 Win32 API call in x86 WoW64 processes.☆73Updated 3 years ago
- Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls☆188Updated last month
- CVE-2022-3699 with arbitrary kernel code execution capability☆70Updated 2 years ago
- Exploit vulnerabilities in NeacSafe64.sys to achieve privilege escalation and kernel-mode shellcode execution☆56Updated 3 months ago
- SMM driver/rootkit for platform memory access with R3 <-> R0 <-> R-2 communication.☆92Updated last year
- ☆29Updated last year
- Uses Threat-Intelligence ETW events to identify shellcode regions being hidden by fluctuating memory protections☆147Updated 2 years ago