HackingThings / SignedUEFIShellLinks
Information about a signed UEFI Shell that can be used when Secure Boot is enabled.
☆83Updated 4 years ago
Alternatives and similar repositories for SignedUEFIShell
Users that are interested in SignedUEFIShell are comparing it to the libraries listed below
Sorting:
- ☆164Updated 4 years ago
- One Bootloader to Load Them All - Research materials, Code , Etc.☆58Updated 3 years ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆93Updated 3 years ago
- ☆147Updated 2 years ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆142Updated 4 years ago
- Different tools for Microsoft Hyper-V researching☆62Updated 3 months ago
- PoC code of Shade BIOS (stripped) presented at Black Hat USA 2025☆59Updated 3 months ago
- Helper idapython code for reversing kmdf drivers☆75Updated 3 years ago
- Exploit POC for CVE-2024-36877☆47Updated last year
- An x64dbg plugin which marks XFG call signatures as data☆77Updated 2 years ago
- The simple UEFI application to create a Windows Platform Binary Table (WPBT) from the UEFI shell.☆120Updated 4 years ago
- Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)☆19Updated 5 years ago
- SPI flash read MitM attack PoC☆39Updated 3 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆256Updated 3 years ago
- ☆96Updated 3 years ago
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆85Updated 5 years ago
- Take back control of Windows Code Integrity, no exploits or patching required! Requires that you control your own Platform Key (PK).☆49Updated 3 years ago
- MalUnpack companion driver☆97Updated last year
- A Python script to download PDB files associated with a Portable Executable (PE)☆125Updated 8 months ago
- Breaking Secure Boot with SMM☆41Updated 3 years ago
- ☆24Updated 4 years ago
- Report and exploit of CVE-2023-36427☆88Updated last year
- Abusing exceptions for code execution.☆113Updated 2 years ago
- Research on obfuscated licensing APIs / CLIP service in the Windows kernel☆122Updated 3 years ago
- Command like tool to print mitigation flags for running processes in a memory dump☆47Updated 5 years ago
- This utility allows you to lock every available memory regions of an arbitrary process into its working set.☆69Updated 2 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 4 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆114Updated 4 years ago
- ☆43Updated 3 years ago
- Enumerate user mode shared memory mappings on Windows.☆125Updated 4 years ago