vxcall / kur
A tiny code that performs kernel-mode read/write using CVE-2023-38817.
☆14Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for kur
- Small handy tool for crafting shellcodes by hand.☆18Updated 2 years ago
- CVE-2022-3699 with arbitrary kernel code execution capability☆70Updated last year
- Using SetWindowHookEx for preinjected DLL's☆57Updated 2 years ago
- A simple direct syscall wrapper written in C++ with compatibility for x86 and x64 programs.☆41Updated last year
- Compileable POC of namazso's x64 return address spoofer.☆47Updated 4 years ago
- Bring Your Own Vulnerable Driver for PatchGuard & Driver Signature Enforcement☆12Updated 7 months ago
- ☆22Updated last year
- PoC kernel to usermode injection☆57Updated 8 months ago
- ☆26Updated last year
- ☆38Updated 3 years ago
- Loader base source using keyauth made by me with basic protection, u can use it as a base for your spoofer/cheat loader☆26Updated 2 months ago
- ntoskrnl .data hooks for UM-KM communication☆34Updated 5 months ago
- using wnbios64.sys for arbitrary r/w☆10Updated 6 months ago
- Only for Stress-Testing☆22Updated 2 years ago
- This is my EAC Bypass (Setup) Driver that offers an undetected communication and callback handler/hooking system through IOCTL.☆68Updated 2 months ago
- Hijack NotifyRoutine for a kernelmode thread☆41Updated 2 years ago
- Fake Timestamps of Driver Certificates while keeping validity.☆16Updated 3 years ago
- A simple kernel driver for R/W Using kSockets with some bypass implementation overall I wouldn't say its "ud"☆43Updated 2 months ago
- Experiment with PAGE_GUARD protection to hide memory from other processes☆36Updated 4 months ago
- manual mapping injector☆26Updated 2 years ago
- hidden_syscall - syscaller without using syscall instruction in code☆58Updated last year
- A windows kernel mode driver that spoofs serial numbers when mapped and executes a malicious payload (FULLY from kernel!!!)☆30Updated 3 weeks ago
- Dynamically generated obfuscated jumps and/or function calls☆33Updated last year
- Fully UD On EAC Now Enjoy Pasters :)☆15Updated last year
- Bypassing kernel patch protection runtime☆19Updated last year
- x64 Windows kernel driver mapper, inject unsigned driver using anycall☆112Updated 8 months ago
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆21Updated 3 weeks ago