kagurazakasanae / Mhyprot2DrvControl
A lib that allows using mhyprot2 driver for enum process modules, r/w process memory and kill process.
☆349Updated 4 years ago
Alternatives and similar repositories for Mhyprot2DrvControl
Users that are interested in Mhyprot2DrvControl are comparing it to the libraries listed below
Sorting:
- A PoC for Mhyprot2.sys vulnerable driver that allowing read/write memory in kernel/user via unprivileged user process.☆335Updated 3 years ago
- A static library, wrapper for mhyprot vulnerable driver, execute exploits and tests☆129Updated 4 years ago
- Mhy Exp (exploit signed driver)☆140Updated 2 years ago
- Controlling Windows PP(L)s☆317Updated last year
- 一些使用过期或者注销证书的技术☆238Updated 5 years ago
- A user-mode emulator for the mhyprot2.sys driver☆114Updated 2 years ago
- 隐藏可执行内存☆249Updated 2 weeks ago
- Use ICMLuaUtil to Bypass UAC!☆548Updated 5 years ago
- CVE-2023-34312☆421Updated last year
- 内核级别隐藏指定窗口☆307Updated 3 years ago
- Kernel driver loader using vulnerable gigabyte driver (https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vu…☆242Updated 3 years ago
- DSE bypass using a leaked cert and adjusting the current clock.☆150Updated 2 years ago
- PE loader with various shellcode injection techniques☆407Updated 2 years ago
- A simple commandline injector using classic DLL injection☆150Updated 2 years ago
- Reverse engineering Genshin Impact anticheat to study how anticheats work on the Windows operating system.☆103Updated 3 years ago
- PoC: Exploit 32-bit Thread Snapshot of WOW64 to Take Over $RIP & Inject & Bypass Antivirus HIPS (HITB 2021)☆161Updated 3 years ago
- shellcode 生成框架☆262Updated 3 years ago
- DLL that hooks the NtQuerySystemInformation API and hides a process name☆288Updated 2 years ago
- 自建时间戳服务器实现伪签名驱动证书 Implementing Pseudo Signature with Self-Sign Timestamp Servers☆299Updated 3 weeks ago
- Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading☆795Updated 4 years ago
- A PoC for vulnerable driver "mhyprot" that allows us to read/write memory in kernel/user from usermode.☆161Updated 4 years ago
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆658Updated last year
- 研究和移除各种内核回调,在anti anti cheat的路上越走越远☆175Updated 2 years ago
- A way to delete a locked file, or current running executable, on disk.☆524Updated 9 months ago
- Windows对抗沙箱和虚拟机的方法总结☆392Updated 5 years ago
- ☆314Updated 2 years ago
- VM一键加壳/脱壳,全压缩,反调试等☆302Updated 10 months ago
- A flexible PE loader, loading module in memory. Most of the functions can be inline, compatible for shellcode.☆196Updated 2 months ago
- Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.☆292Updated last year
- X86 version of syswhispers2 / x86 direct system call☆325Updated 4 years ago