Skip to content
View ghostbyt3's full-sized avatar

Block or report ghostbyt3

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ghostbyt3/README.md

Hi there 👋

I'm a security researcher focused on red teaming and web application security, with a strong interest in reverse engineering, exploit development, and low-level Windows internals.


🛠️ Featured Projects

  • Diffrays - DiffRays is a research-oriented tool for binary patch diffing, designed to aid in vulnerability research, exploit development, and reverse engineering. It leverages IDA Pro and the IDA Domain API to extract pseudocode of functions and perform structured diffing between patched and unpatched binaries.

  • WinDriver‑EXP - A repository of Proof-of-Concepts (PoCs) for vulnerable Windows drivers, written by me.

  • BYOVDFinder - Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.

  • Patch‑Tuesday - A site that efficiently tracks Microsoft Patch Tuesday updates for vulnerability analysis and patch diffing. The full website is published at patch-tuesday.pwnfuzz.com.

  • BYOVD Watchdog - Real-time analysis of LOLDrivers against Microsoft's HVCI blocklist. The full website is published at byovd-watchdog.pwnfuzz.com.


💡 Blog & Research

  • I publish my own technical research and learning notes on ghostbyt3.github.io. The content ranges from Windows kernel internals and exploit techniques to deep dives on specific CVEs and personal notes on topics I’m currently exploring.
  • CTF write-ups and content related to web exploitation and red teaming can be found on my other blog at ctf.pwnfuzz.com.
  • In parallel, I co-manage labs.pwnfuzz.com, which serves as a platform for vulnerability research under the PwnFuzz organization. There, we publish Patch Tuesday breakdowns, vulnerability write-ups, and n-day exploit analyses.

🌐 Connect


Thanks for stopping by! I’m always up for discussing kernel internals, reverse-engineering, and offensive tooling. 🚀

Pinned Loading

  1. pwnfuzz/diffrays pwnfuzz/diffrays Public

    DiffRays is a research-oriented tool for binary patch diffing, designed to aid in vulnerability research, exploit development, and reverse engineering.

    Python 266 17

  2. BYOVDFinder BYOVDFinder Public

    Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.

    PowerShell 72 4

  3. WinDriver-EXP WinDriver-EXP Public

    This repo contains PoCs for vulnerable Windows drivers.

    C++ 17 1

  4. patch-tuesday patch-tuesday Public

    Python script that fetches, analyzes, and reports Microsoft Patch Tuesday updates via the MSRC API — with a clean web interface for easy viewing.

    Python 21 3

  5. pwnfuzz/byovd-watchdog pwnfuzz/byovd-watchdog Public

    Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.

    Python 30

  6. BYOVD-POC BYOVD-POC Public

    POC for BYOVD

    C++ 2