Cr4sh / SmmBackdoorNg
Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks
☆300Updated last year
Alternatives and similar repositories for SmmBackdoorNg:
Users that are interested in SmmBackdoorNg are comparing it to the libraries listed below
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆266Updated last year
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆173Updated last year
- Vulnerable driver research tool, result and exploit PoCs☆184Updated last year
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆224Updated 2 years ago
- Admin to Kernel code execution using the KSecDD driver☆243Updated 10 months ago
- Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths☆321Updated 6 months ago
- Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus)☆522Updated last year
- SMM rootkit similar to LoJax or MosaicRegressor☆107Updated last year
- baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability☆315Updated last year
- PoC Anti-Rootkit/Anti-Cheat Driver.☆181Updated 5 months ago
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆203Updated 3 months ago
- A small x64 library to load dll's into memory.☆429Updated last year
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆243Updated last year
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆243Updated 2 years ago
- The Definitive Guide To Process Cloning on Windows☆457Updated last year
- Encypting the Heap while sleeping by hooking and modifying Sleep with our own sleep that encrypts the heap☆241Updated last year
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆521Updated this week
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆229Updated last year
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆269Updated 4 months ago
- For when DLLMain is the only way☆368Updated 3 months ago
- A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)☆470Updated 2 years ago
- Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate some tedious Windows Kernel Drivers reverse engineering tasks☆343Updated 3 months ago
- Collection of hypervisor detections☆216Updated 4 months ago
- A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and re…☆443Updated last year
- Using Windows' own bootloader as a shim to bypass Secure Boot☆158Updated 7 months ago
- Patching "signtool.exe" to accept expired certificates for code-signing.☆273Updated 7 months ago
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆148Updated last year
- Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling withou…☆190Updated 3 months ago
- Process Injection using Thread Name☆246Updated 5 months ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆333Updated last week