From 10cec9cd2aa5745868ea7694e86025de92907933 Mon Sep 17 00:00:00 2001 From: xerox Date: Sun, 19 Apr 2020 10:36:42 +0000 Subject: [PATCH] Update README.md --- README.md | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/README.md b/README.md index c68ede2..8bd8f71 100644 --- a/README.md +++ b/README.md @@ -12,6 +12,12 @@ Before I begin, those who helped me create this project shall be credited. Given map/unmap (read/write) of physical memory, one can now systematically map unsigned code into ones kernel. Many drivers expose this primitive and now can all be exploited by simply coding a few functions. +### What versions of windows does this mapper support? + +This mapper should work without any issues for pretty much all versions of relevant windows. Tested on windows 10 (1803-1909), but should support all the way back to vista. + + + ### What drivers support physical read/write? Any driver exposing MmMapIoSpace/MmUnmapIoSpace or ZwMapViewOfSection/ZwUnmapViewOfSection can be exploited. This means bios flashing utils, fan speed utils