A static library, wrapper for mhyprot vulnerable driver, execute exploits and tests
☆133Oct 26, 2020Updated 5 years ago
Alternatives and similar repositories for libmhyprot
Users that are interested in libmhyprot are comparing it to the libraries listed below
Sorting:
- A PoC for Mhyprot2.sys vulnerable driver that allowing read/write memory in kernel/user via unprivileged user process.☆351Jul 3, 2021Updated 4 years ago
- A PoC for vulnerable driver "mhyprot" that allows us to read/write memory in kernel/user from usermode.☆160Oct 18, 2020Updated 5 years ago
- A kernelmode driver swapping a .data pointer in the kernel to perform communication between the kernel and usermode.☆142Oct 20, 2020Updated 5 years ago
- Reverse engineering Genshin Impact anticheat to study how anticheats work on the Windows operating system.☆107Nov 27, 2021Updated 4 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆109Sep 1, 2022Updated 3 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆220Nov 12, 2020Updated 5 years ago
- ☆82Aug 17, 2021Updated 4 years ago
- x64 Windows privilege elevation using anycall☆22May 28, 2021Updated 4 years ago
- i stole this from some guys private repo on github☆58Jul 11, 2021Updated 4 years ago
- Kernel driver loader using vulnerable gigabyte driver (https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vu…☆275Oct 2, 2021Updated 4 years ago
- A kernel module dumper for Windows x64 using mhyprot vulnerable driver☆37Oct 26, 2020Updated 5 years ago
- ☆192Dec 8, 2021Updated 4 years ago
- A specially crafted IOCTL can be issued to the rzpnk.sys driver in Razer Synapse 2.20.15.1104 that is forwarded to ZwOpenProcess allowing…☆14Nov 8, 2020Updated 5 years ago
- Kernel mode to user mode injector☆11Mar 31, 2020Updated 5 years ago
- A user-mode emulator for the mhyprot2.sys driver☆119Aug 25, 2022Updated 3 years ago
- base for testing☆187Sep 28, 2024Updated last year
- ☆12Oct 12, 2021Updated 4 years ago
- Access without a real handle☆1,039Apr 10, 2021Updated 4 years ago
- ☆148Jan 24, 2024Updated 2 years ago
- Loads a signed kernel driver which allows you to map any driver to kernel mode without any traces of the signed / mapped driver.☆385Aug 8, 2021Updated 4 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆77Oct 28, 2021Updated 4 years ago
- ☆47Mar 29, 2022Updated 3 years ago
- Using CVE-2021-40449 to manual map kernel mode driver☆104Mar 5, 2022Updated 4 years ago
- Rendering on external windows via hijacking thread contexts☆404Jun 28, 2020Updated 5 years ago
- Known ring3 memory protections that can be handled at a simple level.☆67Jan 28, 2023Updated 3 years ago
- ☆146Jan 13, 2021Updated 5 years ago
- HWID Spoofer which spoofs disk serials, smart disk serials and SMBIOS.☆41Aug 31, 2020Updated 5 years ago
- Easy Anti PatchGuard☆223Apr 9, 2021Updated 4 years ago
- UAC - Cheat developer platform☆28Oct 29, 2021Updated 4 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆345Apr 27, 2020Updated 5 years ago
- Module extending manual mapper☆382Mar 28, 2020Updated 5 years ago
- Handle elevation DKOM against ObRegisterCallbacks☆342Sep 20, 2018Updated 7 years ago
- Hook discord's rendering functions without patching .text.☆14Nov 14, 2021Updated 4 years ago
- a dumb rpm/wpm example driver☆15Jun 7, 2021Updated 4 years ago
- simply manual map any system image☆18Feb 1, 2021Updated 5 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆89Mar 16, 2021Updated 4 years ago
- UEFI bootkit for driver manual mapping☆586Jan 1, 2024Updated 2 years ago
- usermode driver mapper that forcefully loads any signed kernel driver (legit cert) with a big enough section (example: .data, .rdata) to …☆472Jan 3, 2022Updated 4 years ago
- A library to manipulate physical memory from usermode.☆303Sep 5, 2023Updated 2 years ago