x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration
-
Updated
Jul 6, 2022 - C++
x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration
Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215
exploits for HEVD
A Windows utility to elevate any process to nt authority\system using physical memory.
Uses the microsoft-signed truesight.sys to escalate privileges
Add a description, image, and links to the kernel-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the kernel-exploitation topic, visit your repo's landing page and select "manage topics."