x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration
-
Updated
Jul 6, 2022 - C++
x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration
x64 Windows kernel driver mapper, inject unsigned driver using anycall
x64 Windows privilege elevation using anycall
Testing tool for checking programs console output.
Add a description, image, and links to the code-execution topic page so that developers can more easily learn about it.
To associate your repository with the code-execution topic, visit your repo's landing page and select "manage topics."