Home

Awesome

<p align="center"><img src="icon.png"></p> <p align="center"> <img src="https://img.shields.io/github/license/kkent030315/libmhyprot?style=for-the-badge"> <img src="https://img.shields.io/github/last-commit/kkent030315/libmhyprot?style=for-the-badge"> <img src="https://img.shields.io/codefactor/grade/github/kkent030315/libmhyprot?style=for-the-badge"> </p>

IMAGE IMAGE IMAGE

libmhyprot

A static library, wrapper for mhyprot vulnerable driver, execute exploits and tests

The exploit PoC explained here: evil-mhyprot-cli

Features

All of operations above will be executed using vulnerable driver, with ring-0 privilege.
Basically we need to be access-granted by the system using process handle, but we do not even need it.

Requirements

Tested on:

Usage

1. Include header

#include "libmhyprot.h"

2. Init

libmhyprot::mhyprot_init() -> bool

3. Executions

You can use templates to call functions as follows:

using namespace libmhyprot;
read_kernel_memory(addr, buf, size); /*or*/ read_kernel_memory<T>(addr);
read_process_memory(pid, addr, buf, size); /*or*/ read_process_memory<T>(pid, addr);
write_process_memory(pid, addr, buf, size); /*or*/ write_process_memory<T>(pid, addr, val);

4. Unload

Please note that if you did not call this, the vulnerable driver will remains on your system.

libmhyprot::mhyprot_unload() -> void