heyheysky / vulnerable-driverLinks
☆25Updated last year
Alternatives and similar repositories for vulnerable-driver
Users that are interested in vulnerable-driver are comparing it to the libraries listed below
Sorting:
- This repo contains EXPs about Vulnerable Windows Driver☆47Updated last year
- A serie of exploits targeting eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆116Updated 3 months ago
- bootkit驱动映射,三环进程注入加载指定模块☆14Updated last year
- ☆66Updated 2 years ago
- windows rootkit☆60Updated last year
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆60Updated last year
- Heaven's Gate implementation in C for constructing x64 Win32 API call in x86 WoW64 processes.☆80Updated 4 years ago
- An x86-64 code virtualizer for VM based obfuscation☆172Updated last year
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆133Updated 2 years ago
- PoC exploit for HP Hardware Diagnostic's EtdSupp driver☆50Updated 2 years ago
- Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool☆300Updated 2 months ago
- An extended proof-of-concept for the CVE-2021-21551 Dell ‘dbutil_2_3.sys’ Kernel Exploit☆24Updated 4 years ago
- spoof return address☆79Updated 2 years ago
- Windows 11 24H2-25H2 Runtime PatchGuard Bypass☆244Updated 3 months ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆79Updated 3 years ago
- browse microsoft driver server for potentially vulnerable drivers☆30Updated last year
- Hook all callbacks which are registered with LdrRegisterDllNotification☆96Updated 10 months ago
- A native Windows library for intercepting kernel-to-user transitions using instrumentation callbacks☆28Updated 2 years ago
- vm_str.hpp is a header only string obfuscator.☆103Updated 5 months ago
- NtCreateUserProcess with CsrClientCallServer for mainstream Windows x64 version☆42Updated last year
- A basic implementation of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆78Updated 10 months ago
- IAT-Obfuscation to make static analysis of executable harder.☆44Updated 4 years ago
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆78Updated last year
- Walks the CFG bitmap to find previously executable but currently hidden shellcode regions☆130Updated 2 years ago
- CVE-2022-3699 with arbitrary kernel code execution capability☆71Updated 3 years ago
- Finding Truth in the Shadows☆120Updated 3 years ago
- Windows 11 kernel research framework demonstrating DSE bypass on Windows 11 25H2 through boot-time execution. Loads unsigned drivers by s…☆75Updated last month
- SMM driver/rootkit for platform memory access with R3 <-> R0 <-> R-2 communication.☆115Updated last year
- ntoskrnl .data hooks for UM-KM communication☆53Updated last year
- Dynamically generated obfuscated jumps and/or function calls☆38Updated 2 years ago