yardenshafir / IoRingReadWritePrimitive
Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2
☆227Updated 2 years ago
Alternatives and similar repositories for IoRingReadWritePrimitive
Users that are interested in IoRingReadWritePrimitive are comparing it to the libraries listed below
Sorting:
- Static Binary Instrumentation tool for Windows x64 executables☆202Updated last week
- ☆143Updated last year
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆285Updated last year
- Unofficial Common Log File System (CLFS) Documentation☆177Updated 3 years ago
- ☆145Updated last year
- Lenovo Diagnostics Driver EoP - Arbitrary R/W☆172Updated 2 years ago
- Windows LPE exploit for CVE-2022-37969☆134Updated last year
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆245Updated 2 years ago
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆152Updated 2 months ago
- Windows KASLR bypass using prefetch side-channel☆92Updated last year
- ☆159Updated 3 years ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆88Updated 3 years ago
- Admin to Kernel code execution using the KSecDD driver☆249Updated last year
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆217Updated last year
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆117Updated 2 weeks ago
- PoC capable of detecting manual syscalls from usermode.☆195Updated 5 months ago
- Exploitable drivers, you know what I mean☆132Updated last year
- Code Injection, Inject malicious payload via pagetables pml4.☆237Updated 3 years ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆198Updated last month
- Finding Truth in the Shadows☆92Updated 2 years ago
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆232Updated 10 months ago
- This novel way of using NtQueueApcThreadEx by abusing the ApcRoutine and SystemArgument[0-3] parameters by passing a random pop r32; ret …☆248Updated 2 years ago
- Some of my windows kernel exploits for learning purposes☆125Updated 2 years ago
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆117Updated 6 months ago
- Vulnerable driver research tool, result and exploit PoCs☆193Updated last year
- A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.☆178Updated 3 weeks ago
- Kernel Exploits☆252Updated 3 years ago
- Windows x64 kernel mode rootkit process hollowing POC.☆189Updated last year
- Some source code to demonstrate avoiding certain direct syscall detections by locating and JMPing to a legitimate syscall instruction wit…☆214Updated 2 years ago
- Reverse engineering winapi function loadlibrary.☆191Updated 2 years ago