Skip to content
View kkent030315's full-sized avatar
  • @xryus-technologies
  • Minato-ku, Tokyo & New York, USA
  • 05:24 (UTC +09:00)

Highlights

  • Pro
Block or Report

Block or report kkent030315

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned

  1. NoPatchGuardCallback NoPatchGuardCallback Public archive

    x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code

    C 192 34

  2. PageTableInjection PageTableInjection Public

    Code Injection, Inject malicious payload via pagetables pml4.

    C++ 190 57

  3. MsIoExploit MsIoExploit Public

    Exploit MsIo vulnerable driver

    C++ 79 34

  4. anycall anycall Public

    x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration

    C++ 214 59

  5. evil-mhyprot-cli evil-mhyprot-cli Public

    A PoC for Mhyprot2.sys vulnerable driver that allowing read/write memory in kernel/user via unprivileged user process.

    C++ 302 69

  6. CVE-2022-42046 CVE-2022-42046 Public

    CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM

    C++ 158 26