Cr4sh / pico_dmaLinks
Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board
☆93Updated last year
Alternatives and similar repositories for pico_dma
Users that are interested in pico_dma are comparing it to the libraries listed below
Sorting:
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆96Updated 4 months ago
- SMM UEFI module and client for UMD privilege escalation☆60Updated 4 months ago
- uefi diskless persistence technique + OVMF secureboot bypass☆93Updated last year
- SMM rootkit similar to LoJax or MosaicRegressor☆138Updated last year
- Abusing exceptions for code execution.☆113Updated 2 years ago
- bypassing intel txt's tboot integrity checks via coreboot shim☆83Updated 6 months ago
- Another UEFI runtime bootkit☆31Updated 2 years ago
- The sample DXE runtime driver demonstrating how to program DMA remapping.☆64Updated last year
- BYOVD: Loading dbk64.sys and grabbing a handle to it☆158Updated 3 years ago
- SMM driver/rootkit for platform memory access with R3 <-> R0 <-> R-2 communication.☆93Updated 11 months ago
- Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signatures☆34Updated last year
- Compact MBR Bootkit for Windows☆53Updated 3 years ago
- HyperDbg's logic analyzer and chip-level hardware debugger☆53Updated last year
- A Windows executable (PE) packer (x64) with LZMA compression and with full TLS (Thread Local Storage) support☆78Updated 3 weeks ago
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆165Updated last month
- alternative smm driver for ryzen motherboards☆172Updated last year
- A simple hypervisor demonstrating the use of the Intel VT-rp (redirect protection) technology.☆110Updated last year
- Simple PoC for a bootkit written as a UEFI Option ROM Driver☆11Updated 3 years ago
- Example of using Windows Platform Binary Table (WPBT)☆26Updated 2 years ago
- CMake template for a basic EFI application/bootkit. This library is header-only, there is no EDK2 runtime!).☆78Updated 3 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆255Updated 3 years ago
- Resolve DOS MZ executable symbols at runtime☆95Updated 3 years ago
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆85Updated 5 years ago
- Exploit POC for CVE-2024-36877☆47Updated last year
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆142Updated 4 years ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆74Updated 2 years ago
- PoC that measures how long it takes the CPU to execute the CPUID instruction and reports if it suspects a VM. Works on both Windows and L…☆26Updated 5 years ago
- Me fockin' pe protector☆45Updated 2 years ago
- Win64 UEFI Driver-based tool for unrestricted memory R/W☆29Updated 3 years ago
- A list of awesome resources about HyperDbg☆74Updated 3 weeks ago