CVE-2020-15368
CVE-2020-15368, aka "How to exploit a vulnerable driver" (by stong)
evil-mhyprot-cli
A PoC for Mhyprot2.sys vulnerable driver that allowing read/write memory in kernel/user via unprivileged user process. (by kkent030315)
Our great sponsors
CVE-2020-15368 | evil-mhyprot-cli | |
---|---|---|
1 | 3 | |
407 | 299 | |
- | - | |
0.0 | 2.6 | |
about 2 years ago | almost 3 years ago | |
C++ | C++ | |
MIT License | MIT License |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
CVE-2020-15368
Posts with mentions or reviews of CVE-2020-15368.
We have used some of these posts to build our list of alternatives
and similar projects.
evil-mhyprot-cli
Posts with mentions or reviews of evil-mhyprot-cli.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-08-30.
-
Daily Questions Megathread (August 30, 2022)
It's real. It's possible to hijack genshin's anticheat driver, mhyprot3.sys to gain kernel-level access, and since it's a verified legit driver it gets past antivirus. Here's a proof of concept made over a year ago https://github.com/kkent030315/evil-mhyprot-cli
- Hoyoverse claims that requiring admin permission is perfectly normal, refuses to explain what Genshin needs it for
-
Tim Sweeney has a point about Fortnite EAC support
Depends on what you call damage, I guess. Sometimes anti-cheat software is vulnerable and other times these companies are just not trustworthy enough to believe they won't pull a Sony BMG.
What are some alternatives?
When comparing CVE-2020-15368 and evil-mhyprot-cli you can also consider the following projects:
ds3-nrssr-rce - Documentation and proof of concept code for CVE-2022-24125 and CVE-2022-24126.
Mhyprot2DrvControl - A lib that allows using mhyprot2 driver for enum process modules, r/w process memory and kill process.