19 skills found
can1357 / ByePgDefeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.
Cr4sh / KernelForgeA library to develop kernel level Windows payloads for post HVCI era
hakaioffsec / CVE 2024 21338Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.
zer0condition / ZeroHVCIAchieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling without admin permissions or kernel drivers.
Cr4sh / FwexplPC firmware exploitation tool and library
wesmar / KvcKVC enables unsigned driver loading via DSE bypass (g_CiOptions patch, skci.dll hijack, SeCiCallbacks redirection) and PP/PPL manipulation for LSASS memory dumping on modern Windows with HVCI/VBS.
DErDYAST1R / NmiCallbackBlockerKernel Level NMI Callback Blocker
zer0condition / BusterCall"Bypassing" HVCI via donor PFN swaps to modify read-only code pages. Call chained kernel functions (kCET and SLAT support), and more.
GetRektBoy724 / Warbird ResearchFind out how to bypass HVCI (or not). My own research on Microsoft Warbird (specifically in clipsp.sys)
worawit / MalkDemonstrate calling a kernel function and handle process creation callback against HVCI
ghostbyt3 / BYOVDFinderIdentifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.
trailofbits / HVCI Loldrivers CheckNo description available
pwnfuzz / Byovd WatchdogIdentifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.
unkvolism / SolemnSolemn is a lightweight command-line tool for Windows that automates adding drivers to the HVCI (HvciDisallowedImages) custom blocklist
tandasat / Recon2024 DemoProvides commands to read from and write to arbitrary kernel-mode memory for users with the Administrator privilege. HVCI compatible. No test signing mode is required.
K3V1991 / How To Disable VBS HVCIHow to disable VBS/HVCI to increase Performance in Windows-11
KeServiceDescriptorTable / Syscall Hookwindows 10 & 11 patchguard & hvci compatible syscall hook
Zombie-Kaiser / CVE 2024 21338 X64 Build Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.
xvalegendary / HVCIPwnedCVE-2024-35250 demonstrates that HVCI is not a defense against data-only kernel exploits. As long as a driver bug provides an arbitrary R/W primitive, token swap remains a universal SYSTEM elevation technique — no code execution required.