Skip to content

Latest commit

 

History

History
24 lines (15 loc) · 783 Bytes

README.md

File metadata and controls

24 lines (15 loc) · 783 Bytes

Find Vulnerable Drivers

Find .sys files on disk and compare them against known vulnerable file hashes from https://www.loldrivers.io.

It will then print the file location, the hash and filename according to loldrivers.io, plus if the driver is running and if so the service name.

Usage

Clone and run

powershell -ep bypass
. .\find-vulnerable-drivers.ps1

Quick usage:

powershell -ep bypass { iwr https://raw.githubusercontent.com/m0rv4i/find-vulnerable-drivers/master/find-vulnerable-drivers.ps1 | select -ExpandProperty content | iex }

Credits

Inspired by work done by @api0cradle / @oddvar.moe