3itch / checkm8
bypassing intel txt's tboot integrity checks via coreboot shim
☆66Updated last month
Alternatives and similar repositories for checkm8:
Users that are interested in checkm8 are comparing it to the libraries listed below
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆79Updated 6 months ago
- uefi diskless persistence technique + OVMF secureboot bypass☆61Updated last year
- All LLVM binaries scrambled with SigBreaker and used to test against llvm-lit☆14Updated 3 weeks ago
- Report and exploit of CVE-2024-21305.☆34Updated last year
- ☆126Updated last month
- ☆89Updated 2 months ago
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆79Updated 9 months ago
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆114Updated last year
- A journal for $6,000 Riot Vanguard bounty.☆63Updated last year
- Hooking Windows' exception dispatcher to protect process's PML4☆167Updated 3 months ago
- A curated list of awesome resources related to anti virtualization techniques☆47Updated 2 weeks ago
- SMM UEFI module and client for UMD privilege escalation☆43Updated last year
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆136Updated 8 months ago
- Generate a PDB file given the old PDB file and an address mapping☆47Updated last month
- I/O Cache-As-Ram + AMD x86_64 cache line locking | Mirror of https://codeberg.org/3itch/icekit☆14Updated last month
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆40Updated 5 months ago
- A set of LLVM and GCC based plugins that perform code obfuscation.☆123Updated 2 months ago
- ☆45Updated last month
- Abusing exceptions for code execution.☆110Updated 2 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆35Updated last year
- Rule Engine for Dynamic Malware Analysis and Research☆23Updated 3 weeks ago
- Binary Ninja plugin for interacting with the OALabs HashDB service☆18Updated 6 months ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆100Updated last year
- ☆87Updated 11 months ago
- ☆23Updated 5 months ago
- Report and exploit of CVE-2023-36427☆90Updated last year
- Another UEFI runtime bootkit☆30Updated 2 years ago
- Simple anti-instrumentation with EFLAGS.AC☆16Updated last month
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆152Updated last month
- Binary rewriter for 64-bit PE files.☆71Updated last year