https://github.com/kkent030315/libmhyprot
A static library, wrapper for mhyprot vulnerable driver, execute exploits and tests
https://github.com/kkent030315/libmhyprot
Last synced: 7 months ago
JSON representation
A static library, wrapper for mhyprot vulnerable driver, execute exploits and tests
- Host: GitHub
- URL: https://github.com/kkent030315/libmhyprot
- Owner: kkent030315
- License: mit
- Created: 2020-10-15T23:16:56.000Z (almost 5 years ago)
- Default Branch: main
- Last Pushed: 2020-10-26T10:37:08.000Z (almost 5 years ago)
- Last Synced: 2025-03-09T05:43:09.408Z (7 months ago)
- Language: C++
- Size: 2.17 MB
- Stars: 128
- Watchers: 5
- Forks: 44
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
![]()
![]()
![]()


# libmhyprot
A static library, wrapper for mhyprot vulnerable driver, execute exploits and tests### The exploit PoC explained here: [evil-mhyprot-cli](https://github.com/kkent030315/evil-mhyprot-cli)
# Features
- Read Kernel Memory
- Read Process Memory
- Write Process Memory
- Get Process Modules
- Get Process Threads (**New**)
- Get System Uptime (**New**)
- Terminate Process (**New**)All of operations above will be executed using vulnerable driver, with ring-0 privilege.
Basically we need to be access-granted by the system using process handle, but we do not even need it.# Requirements
- Only supports x64
- Might be work on any Windows version that the driver works onTested on:
- Windows10 x64 1903
- Windows7 x64 6.1
- Windows8.1 x64 6.3# Usage
### 1. Include header
```cpp
#include "libmhyprot.h"
```### 2. Init
```cpp
libmhyprot::mhyprot_init() -> bool
```### 3. Executions
You can use templates to call functions as follows:
```cpp
using namespace libmhyprot;
read_kernel_memory(addr, buf, size); /*or*/ read_kernel_memory(addr);
read_process_memory(pid, addr, buf, size); /*or*/ read_process_memory(pid, addr);
write_process_memory(pid, addr, buf, size); /*or*/ write_process_memory(pid, addr, val);
```### 4. Unload
Please note that if you did not call this, the vulnerable driver will remains on your system.
```cpp
libmhyprot::mhyprot_unload() -> void
```