kkent030315 / libmhyprotView external linksLinks
A static library, wrapper for mhyprot vulnerable driver, execute exploits and tests
☆133Oct 26, 2020Updated 5 years ago
Alternatives and similar repositories for libmhyprot
Users that are interested in libmhyprot are comparing it to the libraries listed below
Sorting:
- A PoC for Mhyprot2.sys vulnerable driver that allowing read/write memory in kernel/user via unprivileged user process.☆349Jul 3, 2021Updated 4 years ago
- A PoC for vulnerable driver "mhyprot" that allows us to read/write memory in kernel/user from usermode.☆161Oct 18, 2020Updated 5 years ago
- A kernelmode driver swapping a .data pointer in the kernel to perform communication between the kernel and usermode.☆143Oct 20, 2020Updated 5 years ago
- Reverse engineering Genshin Impact anticheat to study how anticheats work on the Windows operating system.☆107Nov 27, 2021Updated 4 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆109Sep 1, 2022Updated 3 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆220Nov 12, 2020Updated 5 years ago
- ☆82Aug 17, 2021Updated 4 years ago
- x64 Windows privilege elevation using anycall☆22May 28, 2021Updated 4 years ago
- i stole this from some guys private repo on github☆58Jul 11, 2021Updated 4 years ago
- Kernel driver loader using vulnerable gigabyte driver (https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vu…☆271Oct 2, 2021Updated 4 years ago
- A kernel module dumper for Windows x64 using mhyprot vulnerable driver☆37Oct 26, 2020Updated 5 years ago
- ☆192Dec 8, 2021Updated 4 years ago
- A specially crafted IOCTL can be issued to the rzpnk.sys driver in Razer Synapse 2.20.15.1104 that is forwarded to ZwOpenProcess allowing…☆14Nov 8, 2020Updated 5 years ago
- Kernel mode to user mode injector☆11Mar 31, 2020Updated 5 years ago
- A user-mode emulator for the mhyprot2.sys driver☆118Aug 25, 2022Updated 3 years ago
- base for testing☆186Sep 28, 2024Updated last year
- ☆12Oct 12, 2021Updated 4 years ago
- Loads a signed kernel driver which allows you to map any driver to kernel mode without any traces of the signed / mapped driver.☆377Aug 8, 2021Updated 4 years ago
- Access without a real handle☆1,034Apr 10, 2021Updated 4 years ago
- ☆148Jan 24, 2024Updated 2 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆77Oct 28, 2021Updated 4 years ago
- ☆49Mar 29, 2022Updated 3 years ago
- Using CVE-2021-40449 to manual map kernel mode driver☆104Mar 5, 2022Updated 3 years ago
- Known ring3 memory protections that can be handled at a simple level.☆67Jan 28, 2023Updated 3 years ago
- ☆146Jan 13, 2021Updated 5 years ago
- HWID Spoofer which spoofs disk serials, smart disk serials and SMBIOS.☆41Aug 31, 2020Updated 5 years ago
- Easy Anti PatchGuard☆223Apr 9, 2021Updated 4 years ago
- Handle elevation DKOM against ObRegisterCallbacks☆326Sep 20, 2018Updated 7 years ago
- UAC - Cheat developer platform☆28Oct 29, 2021Updated 4 years ago
- Module extending manual mapper☆378Mar 28, 2020Updated 5 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.