Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings
/ CapcomLib Public

A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)

Notifications You must be signed in to change notification settings

Gbps/CapcomLib

Open more actions menu

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

31 Commits
31 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

What is this?

A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)

Driver Signing Enforcement is the Windows 7+ kernel driver verification that ensures that only signed drivers can be loaded on a system that does not have Test Mode enabled. This project by default will exploit the capcom.sys rootkit to load an unsigned driver and bypass DSE. It also provides a simple system to support exploitation of other known signed exploitable drivers to achieve the same effect.

What do I do with this?

It's a PE loader that links against running kernel modules. It's all proof of concept code for my own use, so I can't help you if it breaks or doesn't compile. It's in a working state right now, so feel free to use any part of it.

About

A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •  
Morty Proxy This is a proxified and sanitized view of the page, visit original site.