← Back to hub

BYOVD: Kernel Driver Loaded from Non-Standard User Path

Detects the Bring Your Own Vulnerable Driver (BYOVD) attack by identifying kernel driver loads from paths accessible to unprivileged users. A technique documented in the Windows Privilege Escalation 2025 report for escalating to kernel level, disabling EDR including Falcon, and implanting rootkits. Legitimate OS drivers are never loaded from Temp, AppData, or Downloads.

🔒

Premium Content

This query requires an active subscription to access the code.

Get Access