Cr4sh / pico_dma
Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board
☆73Updated last year
Alternatives and similar repositories for pico_dma:
Users that are interested in pico_dma are comparing it to the libraries listed below
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆68Updated 3 months ago
- HyperDbg's logic analyzer and chip-level hardware debugger☆55Updated 8 months ago
- SMM UEFI module and client for UMD privilege escalation☆32Updated last year
- Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signatures☆32Updated 4 months ago
- Abusing exceptions for code execution.☆109Updated 2 years ago
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆147Updated this week
- Another UEFI runtime bootkit☆29Updated last year
- The sample DXE runtime driver demonstrating how to program DMA remapping.☆58Updated last year
- Unicorn Engine port for UEFI firmware☆46Updated 2 months ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆113Updated last year
- Resolve DOS MZ executable symbols at runtime☆96Updated 3 years ago
- vdk is a set of utilities used to help with exploitation of a vulnerable driver.☆39Updated 2 years ago
- uefi diskless persistence technique + OVMF secureboot bypass☆53Updated 9 months ago
- Tool to dump EFI runtime drivers.☆35Updated 11 months ago
- CMake template for a basic EFI application/bootkit. This library is header-only, there is no EDK2 runtime!).☆76Updated 2 years ago
- Pretty x86 instruction reference site generator☆59Updated 2 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆70Updated last year
- Binary Ninja plugin that can be used to apply Triton's dead store eliminitation pass on basic blocks or functions.☆58Updated 7 months ago
- Windows kernel driver template for cmkr and llvm-msvc.☆34Updated last year
- Hyper-V related resources☆30Updated 11 months ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard