3intermute / ramielLinks
uefi diskless persistence technique + OVMF secureboot bypass
☆95Updated last year
Alternatives and similar repositories for ramiel
Users that are interested in ramiel are comparing it to the libraries listed below
Sorting:
- bypassing intel txt's tboot integrity checks via coreboot shim☆82Updated 10 months ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆132Updated 2 years ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆158Updated 2 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆260Updated 3 years ago
- Exploitable drivers, you know what I mean☆153Updated 2 months ago
- Rewrite and obfuscate code in compiled binaries☆273Updated last month
- Another UEFI runtime bootkit☆35Updated 2 years ago
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆49Updated last year
- SysCaller: SDK for WindowsAPI via syscalls. Dynamic Resolution, Obfuscation, Multi-Language Bindings, & more!☆51Updated 2 months ago
- Windows 11 24H2-25H2 Runtime PatchGuard Bypass☆242Updated 2 months ago
- NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (eithe…☆243Updated 3 months ago
- ☆93Updated last year
- Finding Truth in the Shadows☆120Updated 3 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆115Updated 2 years ago
- All LLVM binaries scrambled with SigBreaker and used to test against llvm-lit☆25Updated 8 months ago
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆137Updated last year
- Abusing exceptions for code execution.☆113Updated 3 years ago
- SMM UEFI module and client for UMD privilege escalation☆65Updated 8 months ago
- Virtual Trust Level (VTL 1) secure call tracing☆86Updated 5 months ago
- Admin to Kernel code execution using the KSecDD driver☆263Updated last year
- SMM driver/rootkit for platform memory access with R3 <-> R0 <-> R-2 communication.☆115Updated last year
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆79Updated 3 years ago
- Report and exploit of CVE-2024-21305.☆38Updated 2 years ago
- x86-64 virtualizing obfuscator written in Rust☆78Updated 2 years ago
- [ARCHIVED] Early work on Abyss (Windows UEFI Bootkit).☆41Updated 5 months ago
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆169Updated 5 months ago
- ntoskrnl .data hooks for UM-KM communication☆53Updated last year
- stack based arithmetic only virtual machine (VM) executes bytecode instructions to perform various basic arithmetic operations and manage…☆26Updated 10 months ago
- Hooking Windows' exception dispatcher to protect process's PML4☆223Updated last year
- A journal for $6,000 Riot Vanguard bounty.☆67Updated 2 years ago