KeServiceDescriptorTable/vulnerable-drivers

GitHub: KeServiceDescriptorTable/vulnerable-drivers

收集未公开CVE的Windows易受攻击驱动程序,支持绕过Secure Boot和HVCI实现内核级权限提升。

Stars: 11 | Forks: 0

# 易受攻击驱动程序 Windows 计算机的易受攻击驱动程序。 **致谢:** - https://github.com/RainbowDynamix - https://github.com/KeServiceDescriptorTable 未来会添加更多。 这些驱动程序已经过测试,可在启用了 Secure Boot 和 HVCI 的计算机上运行。支持 Windows 10 到 11。 这些没有公开的 CVE。我不对您使用这些驱动程序的行为承担任何责任。 | 名称 | 哈希 (SHA256) | 大小 | 直接下载 | |-------------|-------------|--------------|---------------| | AdvCare.sys | 697D3E6D215D1ED6DC2465334502DB92E0CA77AD0B8392C945AC9E0F36509666 | 21,200 | https://raw.githubusercontent.com/KeServiceDescriptorTable/vulnerable-drivers/main/AdvCare.sys | | Cormem.sys | 40C855D20D497823716A08A443DC85846233226985EE653770BC3B245CF2ED0F | 77,616 | https://raw.githubusercontent.com/KeServiceDescriptorTable/vulnerable-drivers/main/Cormem.sys | | cpqsysio64.sys | 4024B090CEBCABAAB884C84EC80FFB15622D12632F236383A9B0A470BFF9FE33 | 15,168 | https://raw.githubusercontent.com/KeServiceDescriptorTable/vulnerable-drivers/main/cpqsysio64.sys | | evga_kernel_driver-x64.sys | 33DA2CE240B4559CC6E847D56C5FBEAA3D644EC160841920EA0A098DCEE28D0E | 39,856 | https://raw.githubusercontent.com/KeServiceDescriptorTable/vulnerable-drivers/main/evga_kernel_driver-x64.sys | | iOCdrv.sys (intel) | B936C4BA80CCEE3B0B3B67FC88C8CAA103FCFC47888E976F6D5B6F113D22F41F | 43,680 | https://raw.githubusercontent.com/KeServiceDescriptorTable/vulnerable-drivers/main/iOCdrv.sys | | ipctype.sys | 8E2ACCE10D704C8B511C8B6211A2BE5D8E4ADE91EBCBDA2AC10018E4C0AE99FB | 14,096 | https://raw.githubusercontent.com/KeServiceDescriptorTable/vulnerable-drivers/main/ipctype.sys | | portwell.sys | 2F0B16ED90B8C15BF52A7C32699DBE0DBCD38FC02ED2DDB4E1BA35487177B6C5 | 16,848 | https://raw.githubusercontent.com/KeServiceDescriptorTable/vulnerable-drivers/main/portwell.sys | | ppa_x64.sys | 988960E31A258EA71CF93A7791AE8C91C8CEFB6AD8A50CDBD1B07F73B524AA61 | 15,560 | https://raw.githubusercontent.com/KeServiceDescriptorTable/vulnerable-drivers/main/ppa_x64.sys | | SysFile_X64.sys | 5B204E0A24B5EA67E79329A8C4EB0513CD52A0E7407B99530323FFF4C5B59E33 | 56,088 | https://raw.githubusercontent.com/KeServiceDescriptorTable/vulnerable-drivers/main/SysFile_X64.sys | | SysInfoX64.sys | 52C5FFD62EAE04B890E0F4C96B84A3305E9B6571975C4352131CFC3D1B73A024 | 15,160 | https://raw.githubusercontent.com/KeServiceDescriptorTable/vulnerable-drivers/main/SysInfoX64.sys | | TBT_Force_Power_Control_Access64.sys | 4C776F34C6042D943BAEC3C13D7154A245AAE8DD95E1933211FD19352C770676 | 15,400 | https://raw.githubusercontent.com/KeServiceDescriptorTable/vulnerable-drivers/main/TBT_Force_Power_Control_Access64.sys |
标签:0day, 0day挖掘, BYOVD, CVE未知, EDR绕过, HVCI绕过, Secure Boot绕过, Web报告查看器, Windows 10, Windows 11, Windows驱动, 云资产清单, 企业安全, 内核利用, 内核安全, 协议分析, 恶意驱动, 数据展示, 权限提升, 漏洞驱动, 红队, 网络安全, 网络资产管理, 逆向工程, 隐私保护, 高交互蜜罐