pwn2own2020
Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities (by sslab-gatech)
evil-mhyprot-cli
A PoC for Mhyprot2.sys vulnerable driver that allowing read/write memory in kernel/user via unprivileged user process. (by kkent030315)
pwn2own2020 | evil-mhyprot-cli | |
---|---|---|
1 | 3 | |
403 | 319 | |
0.5% | - | |
0.0 | 2.6 | |
almost 4 years ago | over 3 years ago | |
C++ | C++ | |
- | MIT License |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
pwn2own2020
Posts with mentions or reviews of pwn2own2020.
We have used some of these posts to build our list of alternatives
and similar projects.
-
Louis Rossmann on YouTube
Yep, MacOS and iOS have lots of vulnerabilities. I think this is a good time to mention: PSA - if your MacOS is older than 10.15.3 Catalina you are vulnerable to a full WebKit >> kernel privilege (root + kernel) exploit chain which can infect your computer through a website. Keep your devices up to date.
evil-mhyprot-cli
Posts with mentions or reviews of evil-mhyprot-cli.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-08-30.
-
Daily Questions Megathread (August 30, 2022)
It's real. It's possible to hijack genshin's anticheat driver, mhyprot3.sys to gain kernel-level access, and since it's a verified legit driver it gets past antivirus. Here's a proof of concept made over a year ago https://github.com/kkent030315/evil-mhyprot-cli
- Hoyoverse claims that requiring admin permission is perfectly normal, refuses to explain what Genshin needs it for
-
Tim Sweeney has a point about Fortnite EAC support
Depends on what you call damage, I guess. Sometimes anti-cheat software is vulnerable and other times these companies are just not trustworthy enough to believe they won't pull a Sony BMG.
What are some alternatives?
When comparing pwn2own2020 and evil-mhyprot-cli you can also consider the following projects:
DeauthDetector - Detect deauthentication frames using an ESP8266
Mhyprot2DrvControl - A lib that allows using mhyprot2 driver for enum process modules, r/w process memory and kill process.