ooooo ooooo oooooooooooo oooooo oooo oooooooooo.
`888' `888' `888' `8 `888. .8' `888' `Y8b
888 888 888 `888. .8' 888 888
888ooooo888 888oooo8 `888. .8' 888 888
888 888 888 " `888.8' 888 888
888 888 888 o `888' 888 d88'
o888o o888o o888ooooood8 `8' o888bood8P'
HackSys Extreme Vulnerable Driver is intentionally vulnerable Windows driver developed for security enthusiasts to learn and polish their exploitation skills at Kernel level.
HackSys Extreme Vulnerable Driver caters wide range of vulnerabilities ranging from simple Buffer Overflows
to complex Use After Frees
and Pool Overflows
. This allows the researchers to explore the exploitation techniques for every implemented vulnerabilities.
http://www.payatu.com/hacksys-extreme-vulnerable-driver/
https://github.com/sam-b/HackSysDriverExploits
https://github.com/sizzop/HEVD-Exploits
https://github.com/badd1e/bug-free-adventure
https://github.com/FuzzySecurity/HackSysTeam-PSKernelPwn
https://github.com/theevilbit/exploits/tree/master/HEVD
https://github.com/GradiusX/HEVD-Python-Solutions
https://github.com/Cn33liz/HSEVD-StackOverflow
https://github.com/Cn33liz/HSEVD-StackOverflowX64
https://github.com/Cn33liz/HSEVD-StackCookieBypass
https://github.com/Cn33liz/HSEVD-ArbitraryOverwrite
https://github.com/Cn33liz/HSEVD-ArbitraryOverwriteGDI
https://github.com/Cn33liz/HSEVD-StackOverflowGDI
http://niiconsulting.com/checkmate/2016/01/windows-kernel-exploitation/
http://whitehatters.academy/intro-to-windows-kernel-exploitation-2-windows-drivers/
http://whitehatters.academy/intro-to-windows-kernel-exploitation-3-my-first-driver-exploit/
http://whitehatters.academy/intro-to-windows-kernel-exploitation-more-of-the-hacksys-driver/
https://sizzop.github.io/2016/07/05/kernel-hacking-with-hevd-part-1.html
https://sizzop.github.io/2016/07/06/kernel-hacking-with-hevd-part-2.html
https://sizzop.github.io/2016/07/07/kernel-hacking-with-hevd-part-3.html
https://sizzop.github.io/2016/07/08/kernel-hacking-with-hevd-part-4.html
https://www.fuzzysecurity.com/tutorials/expDev/14.html
https://www.fuzzysecurity.com/tutorials/expDev/15.html
https://www.fuzzysecurity.com/tutorials/expDev/16.html
https://www.fuzzysecurity.com/tutorials/expDev/17.html
https://www.fuzzysecurity.com/tutorials/expDev/18.html
https://www.fuzzysecurity.com/tutorials/expDev/19.html
https://www.fuzzysecurity.com/tutorials/expDev/20.html
http://dokydoky.tistory.com/445
Ashfaq Ansari
ashfaq[at]payatu[dot]com
@HackSysTeam | Blog | null
- Double Fetch
- Pool Overflow
- Use After Free
- Type Confusion
- Stack Overflow
- Integer Overflow
- Stack Overflow GS
- Arbitrary Overwrite
- Null Pointer Dereference
- Uninitialized Heap Variable
- Uninitialized Stack Variable
- Install Windows Driver Kit
- Change
%localSymbolServerPath%
inBuild_HEVD_Secure_x86.bat
andBuild_HEVD_Vulnerable_x86.bat
driver builder - Run the appropriate driver builder
Build_HEVD_Secure_x86.bat
orBuild_HEVD_Vulnerable_x86.bat
If you do not want to build HackSys Extreme Vulnerable Driver from source, you could download pre-built executables for the latest release:
Use OSR Driver Loader to install HackSys Extreme Vulnerable Driver
The HackSys Extreme Vulnerable Driver and the respective exploits have been tested on Windows 7 SP1 x86
- Windows Kernel Exploitation 1
- Windows Kernel Exploitation 2
- Windows Kernel Exploitation 3
- Windows Kernel Exploitation 4
- Windows Kernel Exploitation 5
- Windows Kernel Exploitation 6
- Windows Kernel Exploitation 7
Please see the file LICENSE
for copying permission
Please see the file CONTRIBUTING.md
for contribution guidelines
Please file any enhancement request or bug report via GitHub Issue Tracker at the below given address: https://github.com/hacksysteam/HackSysExtremeVulnerableDriver/issues