Cr4sh / s6_pcie_microblazeLinks
PCI Express DIY hacking toolkit for Xilinx SP605. This repository is also home of Hyper-V Backdoor and Boot Backdoor, check readme for links and info
☆805Updated last year
Alternatives and similar repositories for s6_pcie_microblaze
Users that are interested in s6_pcie_microblaze are comparing it to the libraries listed below
Sorting:
- A small bootkit which does not rely on x64 assembly.☆491Updated 5 years ago
- LeechCore - Physical Memory Acquisition Library & The LeechAgent Remote Memory Acquisition Agent☆635Updated last month
- "Screwed Drivers" centralized information source for code references, links, etc.☆359Updated 5 years ago
- The research UEFI hypervisor that supports booting an operating system.☆640Updated 10 months ago
- hvpp is a lightweight Intel x64/VT-x hypervisor written in C++ focused primarily on virtualization of already running operating system☆1,207Updated 4 years ago
- Monitoring and controlling kernel API calls with stealth hook using EPT☆1,266Updated 3 years ago
- Intel VT-x based hypervisor aiming to provide a thin VM-exit filtering platform on Windows.☆1,632Updated last year
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,231Updated last year
- Driver loader for bypassing Windows x64 Driver Signature Enforcement☆1,125Updated 5 years ago
- Internals information about Hyper-V☆695Updated last week
- Windows NT x64 syscall fuzzer☆613Updated this week
- Minimalistic VT-x hypervisor with hooks☆876Updated 5 years ago
- Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.☆881Updated 5 years ago
- My notes while studying Windows internals☆431Updated 6 months ago
- IDA plugin and loader for UEFI firmware analysis and reverse engineering automation☆981Updated 3 weeks ago
- Windows NT Syscall tables☆1,296Updated 2 weeks ago
- Obfuscate specific windows apis with different apis☆1,004Updated 4 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆1,203Updated last year
- Simple x86-64 VT-x Hypervisor with EPT Hooking☆899Updated 2 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆608Updated 7 years ago
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆706Updated 4 years ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆620Updated 2 years ago
- Turn off PatchGuard in real time for win7 (7600) ~ later☆1,016Updated 3 years ago
- WinDBG Anti-RootKit Extension☆633Updated 4 years ago
- PCIe Screamer - TLPs experiments...☆178Updated 2 years ago
- RpcView is a free tool to explore and decompile Microsoft RPC interfaces☆983Updated last year
- Windows Kernel Drivers fuzzer☆349Updated 8 years ago
- Universal PatchGuard and Driver Signature Enforcement Disable☆847Updated 6 years ago
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,237Updated last month
- The goal of the tool is to monitor requests received by selected device objects or kernel drivers. The tool is quite similar to IrpTracke…☆387Updated 6 months ago