Skip to content

FuzzySecurity/HackSysTeam-PSKernelPwn

Repository files navigation

PowerShell-KernelPwn

Accompanying blog posts on using PowerShell to exploit the @HackSysTeam Extreme Vulnerable Driver (HEVD).

Win7 x32

Vulnerability Status Link
Stack Overflow Done http://www.fuzzysecurity.com/tutorials/expDev/14.html
Arbitrary Overwrite Done http://www.fuzzysecurity.com/tutorials/expDev/15.html
Null Pointer Dereference Done http://www.fuzzysecurity.com/tutorials/expDev/16.html
Uninitialized Stack Variable Done http://www.fuzzysecurity.com/tutorials/expDev/17.html
Integer Overflow Done http://www.fuzzysecurity.com/tutorials/expDev/18.html
Type Confusion Exploit Only N/A
Use After Free Done http://www.fuzzysecurity.com/tutorials/expDev/19.html
Pool Overflow Done http://www.fuzzysecurity.com/tutorials/expDev/20.html
Stack Overflow GS To Do
Uninitialized Heap Variable Done To do

Win10 x64 (v1511)

Vulnerability Status Link
Arbitrary Overwrite Done http://www.fuzzysecurity.com/tutorials/expDev/21.html

Win10 x64 (v1607)

Vulnerability Status Link
Double Fetch Done To Do

Win10 x64 (v1703)

Vulnerability Status Link
Arbitrary Overwrite Done To Do

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published