Cr4sh / efiXplorerLinks
IDA plugin for UEFI firmware analysis and reverse engineering automation
☆12Updated 3 years ago
Alternatives and similar repositories for efiXplorer
Users that are interested in efiXplorer are comparing it to the libraries listed below
Sorting:
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆11Updated 6 years ago
- Plugins related to LeechCore☆35Updated last week
- LOJAX ROOTKIT (UEFI) +PDF Included[x]☆34Updated 2 years ago
- ☆21Updated 3 years ago
- Exploit POC for CVE-2024-36877☆46Updated 10 months ago
- UEFI bootkit: Hardware Implant. In-Progress☆16Updated 3 years ago
- ☆27Updated 9 years ago
- Take back control of Windows Code Integrity, no exploits or patching required! Requires that you control your own Platform Key (PK).☆49Updated 2 years ago
- ASUSTeK AsIO3 I/O driver unlock☆21Updated 4 years ago
- A thin introspection hypervisor framework that allows for low level resource manipulation.☆13Updated last year
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 3 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆72Updated last year
- System Management RAM analysis tool☆79Updated 10 months ago
- Obfuscat is a tool and framework for obfuscation with predictable size and runtime overhead.☆37Updated last year
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Updated last year
- Enter Product Key Volatile Environment LPE☆12Updated 6 months ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆43Updated 9 months ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆27Updated 6 years ago
- Runtime smm module loader☆33Updated 2 years ago
- NT AUTHORITY\SYSTEM☆38Updated 4 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆26Updated 3 years ago
- Example payload for CVE-2022-21894☆14Updated last year
- Lightweight Threat Detection System - (Base)☆15Updated last year
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Updated last year
- Different tools for Microsoft Hyper-V researching☆58Updated this week
- A UEFI extraction tool☆18Updated 7 months ago
- ☆22Updated 4 years ago
- ☆10Updated 8 years ago
- AMD SVM hypervisor rootkit proof of concept☆46Updated last year
- One Bootloader to Load Them All - Research materials, Code , Etc.☆52Updated 2 years ago