x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration
-
Updated
Jul 6, 2022 - C++
x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration
A PoC for Mhyprot2.sys vulnerable driver that allowing read/write memory in kernel/user via unprivileged user process.
x64 Windows kernel driver mapper, inject unsigned driver using anycall
Exploit MsIo vulnerable driver
Executing Kernel Routines via Syscall Table Hijack (Kernel Code Execution)
A dll injector static library for Win x64 processes with handle elevation supported
A Windows utility to elevate any process to nt authority\system using physical memory.
Add a description, image, and links to the kernel-exploit topic page so that developers can more easily learn about it.
To associate your repository with the kernel-exploit topic, visit your repo's landing page and select "manage topics."