Home

Awesome

<p align="center"><img src="images/logo_min.png"></p> <p align="center"> <img src="https://img.shields.io/github/license/kkent030315/evil-mhyprot-cli?style=for-the-badge"> <img src="https://img.shields.io/github/last-commit/kkent030315/evil-mhyprot-cli?style=for-the-badge"> <img src="https://img.shields.io/codefactor/grade/github/kkent030315/evil-mhyprot-cli?style=for-the-badge"> </p>

IMAGE IMAGE IMAGE

evil-mhyprot-cli

A PoC for Mhyprot2.sys vulnerable driver that allowing read/write memory in kernel/user via unprivileged user process.

Overview

What we can do with this CLI is as follows:

Also:

Requirements

Tested on:

Usage

*.exe <target_process_name> -<options>

following options are available as of now:

Latest

IMAGE