Cr4sh / SmmBackdoorNg
Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks
☆279Updated last year
Related projects ⓘ
Alternatives and complementary repositories for SmmBackdoorNg
- A generic UEFI bootkit used to achieve initial usermode execution. It works with modifications.☆396Updated last year
- Vulnerable driver research tool, result and exploit PoCs☆181Updated last year
- Admin to Kernel code execution using the KSecDD driver☆236Updated 7 months ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆221Updated 2 years ago
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆260Updated 10 months ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆163Updated 10 months ago
- SMM rootkit similar to LoJax or MosaicRegressor☆102Updated last year
- The Definitive Guide To Process Cloning on Windows☆436Updated 10 months ago
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆148Updated 10 months ago
- Debugger Anti-Detection Benchmark☆291Updated 11 months ago
- Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling withou…☆178Updated 3 weeks ago
- Process Injection using Thread Name☆241Updated 2 months ago
- PoCs for Kernelmode rootkit techniques research.☆334Updated last week
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆234Updated last year
- baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability☆299Updated last year
- ☆142Updated 3 months ago
- A small x64 library to load dll's into memory.☆424Updated last year
- Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus)☆520Updated last year
- Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths☆304Updated 3 months ago
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆221Updated last year
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆237Updated 2 years ago
- Side-by-side comparison of the Windows and Linux (GNU) Loaders☆288Updated 2 months ago
- RISC-V Virtual Machine☆204Updated 3 weeks ago
- A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)☆431Updated 2 years ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆154Updated last year
- For when DLLMain is the only way☆353Updated 3 weeks ago
- A simple ptrace-less shared library injector for x64 Linux☆249Updated last year
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆494Updated 7 months ago
- SMM UEFI module and client for UMD privilege escalation☆30Updated last year
- Single header version of System Informer's phnt library.☆186Updated this week