KeServiceDescriptorTable/vulnerable-drivers
GitHub: KeServiceDescriptorTable/vulnerable-drivers
收集未公开CVE的Windows易受攻击驱动程序,支持绕过Secure Boot和HVCI实现内核级权限提升。
Stars: 11 | Forks: 0
# 易受攻击驱动程序
Windows 计算机的易受攻击驱动程序。
**致谢:**
- https://github.com/RainbowDynamix
- https://github.com/KeServiceDescriptorTable
未来会添加更多。
这些驱动程序已经过测试,可在启用了 Secure Boot 和 HVCI 的计算机上运行。支持 Windows 10 到 11。
这些没有公开的 CVE。我不对您使用这些驱动程序的行为承担任何责任。
| 名称 | 哈希 (SHA256) | 大小 | 直接下载 |
|-------------|-------------|--------------|---------------|
| AdvCare.sys | 697D3E6D215D1ED6DC2465334502DB92E0CA77AD0B8392C945AC9E0F36509666 | 21,200 | https://raw.githubusercontent.com/KeServiceDescriptorTable/vulnerable-drivers/main/AdvCare.sys |
| Cormem.sys | 40C855D20D497823716A08A443DC85846233226985EE653770BC3B245CF2ED0F | 77,616 | https://raw.githubusercontent.com/KeServiceDescriptorTable/vulnerable-drivers/main/Cormem.sys |
| cpqsysio64.sys | 4024B090CEBCABAAB884C84EC80FFB15622D12632F236383A9B0A470BFF9FE33 | 15,168 | https://raw.githubusercontent.com/KeServiceDescriptorTable/vulnerable-drivers/main/cpqsysio64.sys |
| evga_kernel_driver-x64.sys | 33DA2CE240B4559CC6E847D56C5FBEAA3D644EC160841920EA0A098DCEE28D0E | 39,856 | https://raw.githubusercontent.com/KeServiceDescriptorTable/vulnerable-drivers/main/evga_kernel_driver-x64.sys |
| iOCdrv.sys (intel) | B936C4BA80CCEE3B0B3B67FC88C8CAA103FCFC47888E976F6D5B6F113D22F41F | 43,680 | https://raw.githubusercontent.com/KeServiceDescriptorTable/vulnerable-drivers/main/iOCdrv.sys |
| ipctype.sys | 8E2ACCE10D704C8B511C8B6211A2BE5D8E4ADE91EBCBDA2AC10018E4C0AE99FB | 14,096 | https://raw.githubusercontent.com/KeServiceDescriptorTable/vulnerable-drivers/main/ipctype.sys |
| portwell.sys | 2F0B16ED90B8C15BF52A7C32699DBE0DBCD38FC02ED2DDB4E1BA35487177B6C5 | 16,848 | https://raw.githubusercontent.com/KeServiceDescriptorTable/vulnerable-drivers/main/portwell.sys |
| ppa_x64.sys | 988960E31A258EA71CF93A7791AE8C91C8CEFB6AD8A50CDBD1B07F73B524AA61 | 15,560 | https://raw.githubusercontent.com/KeServiceDescriptorTable/vulnerable-drivers/main/ppa_x64.sys |
| SysFile_X64.sys | 5B204E0A24B5EA67E79329A8C4EB0513CD52A0E7407B99530323FFF4C5B59E33 | 56,088 | https://raw.githubusercontent.com/KeServiceDescriptorTable/vulnerable-drivers/main/SysFile_X64.sys |
| SysInfoX64.sys | 52C5FFD62EAE04B890E0F4C96B84A3305E9B6571975C4352131CFC3D1B73A024 | 15,160 | https://raw.githubusercontent.com/KeServiceDescriptorTable/vulnerable-drivers/main/SysInfoX64.sys |
| TBT_Force_Power_Control_Access64.sys | 4C776F34C6042D943BAEC3C13D7154A245AAE8DD95E1933211FD19352C770676 | 15,400 | https://raw.githubusercontent.com/KeServiceDescriptorTable/vulnerable-drivers/main/TBT_Force_Power_Control_Access64.sys |
标签:0day, 0day挖掘, BYOVD, CVE未知, EDR绕过, HVCI绕过, Secure Boot绕过, Web报告查看器, Windows 10, Windows 11, Windows驱动, 云资产清单, 企业安全, 内核利用, 内核安全, 协议分析, 恶意驱动, 数据展示, 权限提升, 漏洞驱动, 红队, 网络安全, 网络资产管理, 逆向工程, 隐私保护, 高交互蜜罐