Cr4sh / pico_dmaLinks
Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board
☆94Updated 2 years ago
Alternatives and similar repositories for pico_dma
Users that are interested in pico_dma are comparing it to the libraries listed below
Sorting:
- SMM rootkit similar to LoJax or MosaicRegressor☆142Updated 2 years ago
- SMM UEFI module and client for UMD privilege escalation☆61Updated 6 months ago
- uefi diskless persistence technique + OVMF secureboot bypass☆94Updated last year
- bypassing intel txt's tboot integrity checks via coreboot shim☆83Updated 8 months ago
- Another UEFI runtime bootkit☆33Updated 2 years ago
- BYOVD: Loading dbk64.sys and grabbing a handle to it☆161Updated 3 years ago
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆104Updated last week
- alternative smm driver for ryzen motherboards☆178Updated last year
- SMM driver/rootkit for platform memory access with R3 <-> R0 <-> R-2 communication.☆109Updated last year
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆257Updated 3 years ago
- Abusing exceptions for code execution.☆113Updated 2 years ago
- The sample DXE runtime driver demonstrating how to program DMA remapping.☆70Updated last year
- Compact MBR Bootkit for Windows☆54Updated 3 years ago
- Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signatures☆37Updated last year
- Example of using Windows Platform Binary Table (WPBT)☆26Updated 2 years ago
- WinLicense key extraction via Intel PIN☆107Updated last year
- Win64 UEFI Driver-based tool for unrestricted memory R/W☆29Updated 3 years ago
- CMake template for a basic EFI application/bootkit. This library is header-only, there is no EDK2 runtime!).☆79Updated 3 years ago
- A Windows PE packer for executables (x64) with LZMA compression and with full TLS (Thread Local Storage) support.☆90Updated last month
- A simple hypervisor demonstrating the use of the Intel VT-rp (redirect protection) technology.☆110Updated last year
- HyperDbg's logic analyzer and chip-level hardware debugger☆53Updated last year
- Resolve DOS MZ executable symbols at runtime☆96Updated 4 years ago
- Tool to dump UEFI runtime drivers implementing runtime services for Windows☆108Updated 4 years ago
- Plugins related to LeechCore☆42Updated 2 months ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆130Updated 2 years ago
- AMD Hypervisor written writh Rust.☆157Updated 2 years ago
- ☆39Updated 3 years ago
- Exploit POC for CVE-2024-36877☆48Updated last year
- PoC that measures how long it takes the CPU to execute the CPUID instruction and reports if it suspects a VM. Works on both Windows and L…☆26Updated 5 years ago
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆167Updated 3 months ago