byovd
Here are 14 public repositories matching this topic...
🤖 Kill The Protected Process 🤖
-
Updated
May 29, 2024 - Rust
Some POCs for my BYOVD research and find some vulnerable drivers
-
Updated
Jul 21, 2025 - Rust
「💀」Proof of concept on BYOVD attack
-
Updated
Dec 7, 2024 - C++
DSE & PG bypass via BYOVD attack
-
Updated
Jul 12, 2025 - C++
「
-
Updated
Dec 7, 2024 - C++
📟 A tiny code that performs kernel-mode read/write using CVE-2023-38817.
-
Updated
Mar 28, 2025 - C++
Some basic info, resources, and code snippets about windows kernel exploitation
-
Updated
Jul 18, 2025 - Python
This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I/O ports, and MSRs. Instead of hardcoded base address of Ntoskrnl.exe, I calculated it dynamically and recalulated the fields offsets
-
Updated
Aug 5, 2024 - C++
Improve this page
Add a description, image, and links to the byovd topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the byovd topic, visit your repo's landing page and select "manage topics."