yardenshafir / IoRingReadWritePrimitiveLinks
Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2
☆229Updated 3 years ago
Alternatives and similar repositories for IoRingReadWritePrimitive
Users that are interested in IoRingReadWritePrimitive are comparing it to the libraries listed below
Sorting:
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆206Updated 3 months ago
- ☆145Updated last year
- Static Binary Instrumentation tool for Windows x64 executables☆206Updated 2 months ago
- Vulnerable driver research tool, result and exploit PoCs☆195Updated last year
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆92Updated 3 years ago
- ☆162Updated 3 years ago
- Unofficial Common Log File System (CLFS) Documentation☆179Updated 3 years ago
- Lenovo Diagnostics Driver EoP - Arbitrary R/W☆174Updated 2 years ago
- ☆146Updated 2 years ago
- Some of my windows kernel exploits for learning purposes☆129Updated 3 years ago
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆153Updated 4 months ago
- Windows KASLR bypass using prefetch side-channel☆111Updated last year
- Exploitable drivers, you know what I mean☆150Updated last year
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆248Updated 2 years ago
- Windows LPE exploit for CVE-2022-37969☆135Updated 2 years ago
- Abusing exceptions for code execution.☆111Updated 2 years ago
- Admin to Kernel code execution using the KSecDD driver☆251Updated last year
- PoC capable of detecting manual syscalls from usermode.☆198Updated 7 months ago
- ☆176Updated 11 months ago
- BYOVD: Loading dbk64.sys and grabbing a handle to it☆154Updated 3 years ago
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆152Updated last year
- Code Injection, Inject malicious payload via pagetables pml4.☆241Updated 4 years ago
- Report and exploit of CVE-2023-36427☆90Updated last year
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆127Updated last week
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆146Updated 10 months ago
- Kernel Exploits☆257Updated 3 years ago
- HackSysExtremeVulnerableDriver exploits for latest Windows 10 version☆25Updated 3 years ago
- LPE exploit for CVE-2023-36802☆22Updated last year
- APC Internals Research Code☆166Updated 5 years ago
- ☆91Updated last year