x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration
What is the kkent030315/anycall GitHub project? Description: "x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration". Written in C++. Explain what it does, its main use cases, key features, and who would benefit from using it.
Question is copied to clipboard — paste it after the AI opens.
Clone via HTTPS
Clone via SSH
Download ZIP
Download master.zipReport bugs or request features on the anycall issue tracker:
Open GitHub Issues