Skip to content
View ghostbyt3's full-sized avatar

Block or report ghostbyt3

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ghostbyt3/README.md

Hi there 👋

I'm a security researcher focused on red teaming and web application security, with a strong interest in reverse engineering, exploit development, and low-level Windows internals.


🛠️ Featured Projects

  • WinDriver‑EXP - A repository of Proof-of-Concepts (PoCs) for vulnerable Windows drivers, written by me.

  • BYOVDFinder - Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.

  • Patch‑Tuesday - A site that efficiently tracks Microsoft Patch Tuesday updates for vulnerability analysis and patch diffing. The full website is published at patch-tuesday.pwnfuzz.com.

  • BYOVD Watchdog - Real-time analysis of LOLDrivers against Microsoft's HVCI blocklist. The full website is published at byovd-watchdog.pwnfuzz.com.


💡 Blog & Research

  • I publish my own technical research and learning notes on ghostbyt3.github.io. The content ranges from Windows kernel internals and exploit techniques to deep dives on specific CVEs and personal notes on topics I’m currently exploring.
  • CTF write-ups and content related to web exploitation and red teaming can be found on my other blog at ctf.pwnfuzz.com.
  • In parallel, I co-manage labs.pwnfuzz.com, which serves as a platform for vulnerability research under the PwnFuzz organization. There, we publish Patch Tuesday breakdowns, vulnerability write-ups, and n-day exploit analyses.

🌐 Connect


Thanks for stopping by! I’m always up for discussing kernel internals, reverse-engineering, and offensive tooling. 🚀

Pinned Loading

  1. BYOVDFinder BYOVDFinder Public

    Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.

    PowerShell 61 4

  2. WinDriver-EXP WinDriver-EXP Public

    This repo contains PoCs for vulnerable Windows drivers.

    C++ 13 1

  3. patch-tuesday patch-tuesday Public

    Python script that fetches, analyzes, and reports Microsoft Patch Tuesday updates via the MSRC API — with a clean web interface for easy viewing.

    Python 18 1