x64 Windows kernel driver mapper, inject unsigned driver using anycall
-
Updated
Feb 14, 2024 - C++
x64 Windows kernel driver mapper, inject unsigned driver using anycall
A Windows utility to elevate any process to nt authority\system using physical memory.
x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration
Exploit MsIo vulnerable driver
A PoC for Mhyprot2.sys vulnerable driver that allowing read/write memory in kernel/user via unprivileged user process.
A dll injector static library for Win x64 processes with handle elevation supported
Add a description, image, and links to the kernel-exploit topic page so that developers can more easily learn about it.
To associate your repository with the kernel-exploit topic, visit your repo's landing page and select "manage topics."