kkent030315 / libmhyprotLinks
A static library, wrapper for mhyprot vulnerable driver, execute exploits and tests
☆131Updated 5 years ago
Alternatives and similar repositories for libmhyprot
Users that are interested in libmhyprot are comparing it to the libraries listed below
Sorting:
- A PoC for Mhyprot2.sys vulnerable driver that allowing read/write memory in kernel/user via unprivileged user process.☆339Updated 4 years ago
- A PoC for vulnerable driver "mhyprot" that allows us to read/write memory in kernel/user from usermode.☆162Updated 5 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆218Updated 4 years ago
- Kernel driver loader using vulnerable gigabyte driver (https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vu…☆261Updated 4 years ago
- Disables virtualprotect checks/hooks so you can modify memory and change memory protection in binaries protected by VMProtect.☆128Updated 4 years ago
- Easy Anti PatchGuard☆222Updated 4 years ago
- BattlEye kernel module bypass☆174Updated 3 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆361Updated 3 years ago
- Windows Kernel inject (no module no thread)☆279Updated 2 years ago
- Reverse engineering Genshin Impact anticheat to study how anticheats work on the Windows operating system.☆104Updated 3 years ago
- Linux kernel module for memflow's KVM connector☆46Updated 10 months ago
- x64 Windows kernel driver mapper, inject unsigned driver using anycall☆177Updated last year
- Capcom driver exploit wrapper☆128Updated 6 years ago
- An Injector that can inject dll into game process protected by anti cheat using SetWindowsHookEx.☆241Updated 6 years ago
- SetWindowsHookEx Injector☆175Updated 2 years ago
- Archive R/W into any protected process by changing the value of KTHREAD->PreviousMode☆163Updated 3 years ago
- Allows you to communicate with the kernel mode to manipulate memory in a stealthy way to avoid kernel anticheats.☆172Updated 3 years ago
- An AI-powered assistant for IDA 9.0+ to accelerate reverse engineering of C++ games.☆193Updated 3 weeks ago
- Using CVE-2023-21768 to manual map kernel mode driver☆194Updated 2 years ago
- Vectored Exception Handling Hooking Class☆165Updated 6 years ago
- Drawing from kernelmode without any hooks☆173Updated 3 years ago
- ☆189Updated 3 years ago
- ☆45Updated 4 years ago
- Unsigned driver loader using CVE-2018-19320☆311Updated 2 years ago
- Simple EFI runtime driver that hooks GetVariable function and returns data expected by Windows to make it think that it's running with se…☆205Updated 4 years ago
- Loads a signed kernel driver which allows you to map any driver to kernel mode without any traces of the signed / mapped driver.☆357Updated 4 years ago
- driver manual mapper powered by https://github.com/estimated1337/lenovo_exec☆111Updated 2 years ago
- Unknowncheats Magically Optimized Tidy Mapper using nvaudio☆137Updated last year
- Load your driver like win32k.sys☆255Updated 3 years ago
- ☆216Updated 3 years ago