Thanks to visit codestin.com
Credit goes to github.com

Skip to content
View kkent030315's full-sized avatar

Block or report kkent030315

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. anycall anycall Public

    x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration

    C++ 359 68

  2. evil-mhyprot-cli evil-mhyprot-cli Public

    A PoC for Mhyprot2.sys vulnerable driver that allowing read/write memory in kernel/user via unprivileged user process.

    C++ 339 69

  3. PageTableInjection PageTableInjection Public

    Code Injection, Inject malicious payload via pagetables pml4.

    C++ 243 60

  4. NoPatchGuardCallback NoPatchGuardCallback Public archive

    x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code

    C 206 35

  5. anymapper anymapper Public

    x64 Windows kernel driver mapper, inject unsigned driver using anycall

    C++ 177 38

  6. CVE-2022-42046 CVE-2022-42046 Public

    CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM

    C++ 162 26