byovd
Here are 23 public repositories matching this topic...
🤖 Kill The Protected Process 🤖
-
Updated
May 29, 2024 - Rust
BYOVD research use cases featuring vulnerable driver discovery and reverse engineering methodology. (CVE-2025-52915, CVE-2025-1055,).
-
Updated
Oct 15, 2025 - Rust
PoC exploit for the vulnerable WatchDog Anti-Malware driver (amsdk.sys) – weaponized to kill protected EDR/AV processes via BYOVD.
-
Updated
Sep 11, 2025 - C++
「💀」Proof of concept on BYOVD attack
-
Updated
Dec 7, 2024 - C++
DSE & PG bypass via BYOVD attack
-
Updated
Jul 12, 2025 - C++
「
-
Updated
Dec 7, 2024 - C++
BYOVD hunter to help prioritize windows drivers worth manual analysis
-
Updated
Aug 19, 2025 - Rust
📟 a tiny code that performs kernel-mode read/write using CVE-2023-38817.
-
Updated
Mar 28, 2025 - C++
Some basic info, resources, and code snippets about windows kernel exploitation
-
Updated
Jul 18, 2025 - Python
CVE-2022-22077 is a high-severity vulnerability (CVSS score 7.8) affecting the RTCore64.sys driver distributed with MSI Center
-
Updated
Oct 19, 2025 - C
This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I/O ports, and MSRs. Instead of hardcoded base address of Ntoskrnl.exe, I calculated it dynamically and recalulated the fields offsets
-
Updated
Aug 5, 2024 - C++
The project demonstrates a simple detection method for SSDT Hook in User Mode via BYOVD
-
Updated
Sep 20, 2025 - C
Improve this page
Add a description, image, and links to the byovd topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the byovd topic, visit your repo's landing page and select "manage topics."