A PoC for vulnerable driver "mhyprot" that allows us to read/write memory in kernel/user from usermode.
☆160Oct 18, 2020Updated 5 years ago
Alternatives and similar repositories for evil-mhyprot-cli
Users that are interested in evil-mhyprot-cli are comparing it to the libraries listed below
Sorting:
- ☆28Sep 29, 2020Updated 5 years ago
- ☆41Mar 23, 2023Updated 2 years ago
- A static library, wrapper for mhyprot vulnerable driver, execute exploits and tests☆133Oct 26, 2020Updated 5 years ago
- ☆51Aug 20, 2022Updated 3 years ago
- Discarded Section Manual Map☆70Jun 18, 2020Updated 5 years ago
- A kernel module dumper for Windows x64 using mhyprot vulnerable driver☆37Oct 26, 2020Updated 5 years ago
- ☆158May 21, 2024Updated last year
- ☆146Dec 28, 2020Updated 5 years ago
- A PoC for Mhyprot2.sys vulnerable driver that allowing read/write memory in kernel/user via unprivileged user process.☆351Jul 3, 2021Updated 4 years ago
- PoC: make WDA_MONITOR window transparent on screenshot/capture☆101Feb 5, 2020Updated 6 years ago
- ☆24May 17, 2022Updated 3 years ago
- Hide SMBIOS/disk/NIC serials from EFI bootkit☆324May 14, 2021Updated 4 years ago
- Detect removed thread from PspCidTable.☆75Mar 18, 2022Updated 3 years ago
- Communication via callback☆73Oct 9, 2019Updated 6 years ago
- Analysing and defeating PatchGuard universally☆36Nov 4, 2020Updated 5 years ago
- ☆43Jan 22, 2019Updated 7 years ago
- ☆110Nov 13, 2023Updated 2 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆84Dec 25, 2021Updated 4 years ago
- Hide external overlay by using SetWindowDisplayAffinity☆102Sep 5, 2021Updated 4 years ago
- Some usefull info when reverse engineering Kernel Mode Anti-Cheat☆78Feb 20, 2023Updated 3 years ago
- ☆146Jan 13, 2021Updated 5 years ago
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆83Oct 6, 2022Updated 3 years ago
- Bypasses for Windows kernel callbacks PatchGuard protection☆44Aug 15, 2021Updated 4 years ago
- Simple handler for bypass battleye in 5 seconds☆11May 23, 2021Updated 4 years ago
- Rendering on external windows via hijacking thread contexts☆404Jun 28, 2020Updated 5 years ago
- A kernelmode driver swapping a .data pointer in the kernel to perform communication between the kernel and usermode.☆142Oct 20, 2020Updated 5 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆116Aug 10, 2020Updated 5 years ago
- ☆75Dec 17, 2019Updated 6 years ago
- Hygieia, a vulnerable driver traces scanner written in C++ as an x64 Windows kernel driver.☆151Feb 12, 2022Updated 4 years ago
- Manual mapping without creating any threads, with rw only access☆806Oct 29, 2019Updated 6 years ago
- Utilizes a kernel driver for hooking steams overlay than manual mapping our dll to the games memory. Has a bunch of features like esp and…☆92Feb 6, 2020Updated 6 years ago
- NT reversal☆25Jul 12, 2018Updated 7 years ago
- A library to manipulate physical memory from usermode.☆303Sep 5, 2023Updated 2 years ago
- ☆185May 5, 2019Updated 6 years ago
- simply manual map any system image☆18Feb 1, 2021Updated 5 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆44Sep 1, 2018Updated 7 years ago
- base for testing☆187Sep 28, 2024Updated last year
- update face injector by KANKOSHEV