PoC code and tools for Black Hat USA 2024
☆24Aug 1, 2024Updated last year
Alternatives and similar repositories for orom-backdoor-research
Users that are interested in orom-backdoor-research are comparing it to the libraries listed below
Sorting:
- A simple CLI tool for detecting breached emails and corresponding passwords.☆17Feb 4, 2024Updated 2 years ago
- Example of using Windows Platform Binary Table (WPBT)☆27Jul 9, 2023Updated 2 years ago
- Experiment to use sections as User/Kernelmode comm vector☆22Apr 7, 2023Updated 2 years ago
- Trustzone Exploit that allows running code in secure mode on Surface RT (Tegra 3) with the help of Yahallo (by imbushuo)☆11Mar 30, 2023Updated 2 years ago
- A REALLY Danger Windows Driver, Turn Any threads Ring0!☆13Aug 11, 2025Updated 6 months ago
- mash hypervisor host pml4☆17Jun 22, 2022Updated 3 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆32Nov 17, 2019Updated 6 years ago
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- Can convert any binary data into an Obj with vertices, useful for reverse-engineering.☆11Nov 1, 2025Updated 4 months ago
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w…☆10Jul 25, 2023Updated 2 years ago
- Simple PoC for a bootkit written as a UEFI Option ROM Driver☆11Oct 5, 2022Updated 3 years ago
- Basic utilities for executing, reading and writing 64-bit data in a 32-bit WoW64 process☆19Jul 8, 2022Updated 3 years ago
- ☆20Mar 15, 2023Updated 2 years ago
- 正确解析 _HEAP_VS_***符号 ,支持在最新win11 24h2 运行,替换windbg自带的!pool命令☆17Nov 30, 2024Updated last year
- This is an instruction to run your own SMM code.☆108Mar 8, 2021Updated 4 years ago
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆39Nov 26, 2024Updated last year
- https://www.huorong.cn/☆15Apr 16, 2024Updated last year
- Protect your PHP project from deserialization attacks! As seen on NDSS 2024☆15Aug 8, 2025Updated 6 months ago
- CPU-Z Exploit Proof of Concept☆32Feb 17, 2019Updated 7 years ago
- Schematic for an ultrasonic jammer that produces noise at 20kHz, around the range of the iPhone MEMS microphone. It's a way to non-invasi…☆18Aug 19, 2020Updated 5 years ago
- ☆17Oct 31, 2022Updated 3 years ago
- An example of Windows NT Native API application and kernel driver☆22Feb 10, 2020Updated 6 years ago
- My try to implement a virtual CPU in C☆19Nov 18, 2023Updated 2 years ago
- Executes Read/Write process memory with `NtQueryCompositionSurfaceStatistics`☆23Feb 10, 2024Updated 2 years ago
- Ghidra analyzer for UEFI firmware.☆18Jun 24, 2023Updated 2 years ago
- .NET deserialization hunter☆86Jul 21, 2024Updated last year
- Windows kernel drivers simple HTTP library for modern C++☆40Jul 12, 2018Updated 7 years ago
- A power-modulated jammer in GnuRadio☆22Jan 14, 2022Updated 4 years ago
- Bootkits☆19Sep 13, 2023Updated 2 years ago
- ☆16Mar 26, 2024Updated last year
- Half-Duplex chatting using HackRF with GUI☆24Mar 25, 2024Updated last year
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Oct 20, 2022Updated 3 years ago
- anti cheat drv open source☆19Apr 18, 2024Updated last year
- ☆49Nov 7, 2024Updated last year
- windows rpc 使用MIDL+RPC实现HelloWorld☆23Mar 21, 2018Updated 7 years ago
- A kernel mode Windows rootkit in development.☆49Dec 31, 2021Updated 4 years ago
- uefi diskless persistence technique + OVMF secureboot bypass☆95Apr 22, 2024Updated last year
- x64 Registration-Free In-Process COM Automation Server.☆51Nov 28, 2022Updated 3 years ago
- API Hammering with C++20☆50Jul 21, 2022Updated 3 years ago