Cr4sh / s6_pcie_microblaze
PCI Express DIY hacking toolkit for Xilinx SP605. This repository is also home of Hyper-V Backdoor and Boot Backdoor, check readme for links and info
☆758Updated 7 months ago
Alternatives and similar repositories for s6_pcie_microblaze:
Users that are interested in s6_pcie_microblaze are comparing it to the libraries listed below
- A small bootkit which does not rely on x64 assembly.☆460Updated 5 years ago
- LeechCore - Physical Memory Acquisition Library & The LeechAgent Remote Memory Acquisition Agent☆560Updated this week
- "Screwed Drivers" centralized information source for code references, links, etc.☆344Updated 4 years ago
- My notes while studying Windows internals☆407Updated last month
- First open source and publicly available System Management Mode backdoor for UEFI based platforms. Good as general purpose playground for…☆590Updated last year
- Canadian Furious Beaver is a ProcMon-style tool designed only for capturing IRPs sent to any Windows driver.☆312Updated 9 months ago
- Windows NT x64 syscall fuzzer☆596Updated last year
- IDA plugin and loader for UEFI firmware analysis and reverse engineering automation☆933Updated 2 weeks ago
- Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.☆851Updated 5 years ago
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,133Updated last month
- hvpp is a lightweight Intel x64/VT-x hypervisor written in C++ focused primarily on virtualization of already running operating system☆1,139Updated 3 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆585Updated 7 years ago
- Obfuscate specific windows apis with different apis☆987Updated 3 years ago
- A tool for UEFI firmware reverse engineering☆339Updated 3 weeks ago
- The research UEFI hypervisor that supports booting an operating system.☆576Updated 5 months ago
- VivienneVMM is a stealthy debugging framework implemented via an Intel VT-x hypervisor.☆788Updated 4 years ago
- Simple x86-64 VT-x Hypervisor with EPT Hooking☆865Updated last year
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,188Updated 8 months ago
- Intel VT-x based hypervisor aiming to provide a thin VM-exit filtering platform on Windows.☆1,566Updated last year
- Internals information about Hyper-V☆682Updated 2 weeks ago
- Minimalistic VT-x hypervisor with hooks☆832Updated 5 years ago
- Monitoring and controlling kernel API calls with stealth hook using EPT☆1,199Updated 2 years ago
- RpcView is a free tool to explore and decompile Microsoft RPC interfaces☆947Updated last year
- DriverBuddy is an IDA Python script to assist with the reverse engineering of Windows kernel drivers.☆354Updated 5 years ago
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆689Updated 4 years ago
- An analysis of the Warbird virtual-machine protection for the CI!g_pStore☆244Updated 6 years ago
- UEFI bootkit for driver manual mapping☆532Updated last year
- A project for allowing EDK-II Development with Visual Studio☆509Updated 2 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆800Updated 2 years ago
- A generic UEFI bootkit used to achieve initial usermode execution. It works with modifications.☆404Updated last year