CVE-2020-15368 VS evil-mhyprot-cli

Compare CVE-2020-15368 vs evil-mhyprot-cli and see what are their differences.

CVE-2020-15368

CVE-2020-15368, aka "How to exploit a vulnerable driver" (by stong)

evil-mhyprot-cli

A PoC for Mhyprot2.sys vulnerable driver that allowing read/write memory in kernel/user via unprivileged user process. (by kkent030315)
Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
CVE-2020-15368 evil-mhyprot-cli
1 3
407 299
- -
0.0 2.6
about 2 years ago almost 3 years ago
C++ C++
MIT License MIT License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

CVE-2020-15368

Posts with mentions or reviews of CVE-2020-15368. We have used some of these posts to build our list of alternatives and similar projects.

evil-mhyprot-cli

Posts with mentions or reviews of evil-mhyprot-cli. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-08-30.

What are some alternatives?

When comparing CVE-2020-15368 and evil-mhyprot-cli you can also consider the following projects:

ds3-nrssr-rce - Documentation and proof of concept code for CVE-2022-24125 and CVE-2022-24126.

Mhyprot2DrvControl - A lib that allows using mhyprot2 driver for enum process modules, r/w process memory and kill process.