Skip to content

Latest commit

 

History

History
7 lines (5 loc) · 842 Bytes

README.md

File metadata and controls

7 lines (5 loc) · 842 Bytes

What is this?

A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)

Driver Signing Enforcement is the Windows 7+ kernel driver verification that ensures that only signed drivers can be loaded on a system that does not have Test Mode enabled. This project by default will exploit the capcom.sys rootkit to load an unsigned driver and bypass DSE. It also provides a simple system to support exploitation of other known signed exploitable drivers to achieve the same effect.

What do I do with this?

It's a PE loader that links against running kernel modules. It's all proof of concept code for my own use, so I can't help you if it breaks or doesn't compile. It's in a working state right now, so feel free to use any part of it.