kkent030315
kkent030315
anycall
x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration
PageTableInjection
Code Injection, Inject malicious payload via pagetables pml4.
NoPatchGuardCallback
x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code
evil-mhyprot-cli
A PoC for Mhyprot2.sys vulnerable driver that allowing read/write memory in kernel/user via unprivileged user process.
NtSymbol
Resolve DOS MZ executable symbols at runtime
anymapper
x64 Windows kernel driver mapper, inject unsigned driver using anycall
MsIoExploit
Exploit MsIo vulnerable driver
anyelevate
x64 Windows privilege elevation using anycall
anyvtop
x64 Windows implementation of virtual-address to physical-address translation
kdump
A kernel module dumper for Windows x64 using mhyprot vulnerable driver