NikolajSchlej / Hydroph0biaLinks
Binaries, drivers, PoCs and other stuff on Hydroph0bia vulnerability (CVE-2025-4275)
☆31Updated 2 months ago
Alternatives and similar repositories for Hydroph0bia
Users that are interested in Hydroph0bia are comparing it to the libraries listed below
Sorting:
- bypassing intel txt's tboot integrity checks via coreboot shim☆80Updated 5 months ago
- uefi diskless persistence technique + OVMF secureboot bypass☆89Updated last year
- Contains all the applications developed for the Second part of the 7th Edition of Windows Internals book☆112Updated last year
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆156Updated this week
- Report and exploit of CVE-2024-21305.☆36Updated last year
- Research on obfuscated licensing APIs / CLIP service in the Windows kernel☆120Updated 3 years ago
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆93Updated 3 months ago
- SMM UEFI module and client for UMD privilege escalation☆54Updated 3 months ago
- Information about a signed UEFI Shell that can be used when Secure Boot is enabled.☆83Updated 4 years ago
- Intel 64/Windows low-level experiments☆60Updated this week
- NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (eithe…☆220Updated last month
- Simple PoC for a bootkit written as a UEFI Option ROM Driver☆11Updated 2 years ago
- I/O Cache-As-Ram + AMD x86_64 cache line locking | Mirror of https://codeberg.org/3itch/icekit☆17Updated 5 months ago
- Reverse SSH C2☆20Updated this week
- Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board☆90Updated last year
- ☆88Updated 6 months ago
- Virtual Trust Level (VTL 1) secure call tracing☆42Updated this week
- ☆152Updated 3 weeks ago
- REcon 2024 Repo, slides for talk "GOP Complex: Image parsing bugs, EBC polymorphic engines and the Deus ex machina of UEFI exploit dev""☆13Updated 5 months ago
- Rewrite and obfuscate code in compiled binaries☆223Updated last week
- hypervisor enforced patch protection for the linux kernel with xen + libvmi, libvmi KASLR offset spoofer☆33Updated last year
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆253Updated 3 years ago
- Unlicensed tiny / small portable implementation of 128/256-bit AES encryption in C, x86, AMD64, ARM32 and ARM64 assembly☆129Updated 4 months ago
- Easy encrypt/decrypt data with TPM☆25Updated last year
- A few examples of how to trap virtual memory access on Windows.☆33Updated 8 months ago
- RISC-V Virtual Machine☆244Updated 2 months ago
- Windows KASLR bypass using prefetch side-channel☆120Updated last year
- Modular and extensible library for Virtual Machine Introspection☆107Updated 2 weeks ago
- Another UEFI runtime bootkit☆30Updated 2 years ago
- Integration of Microsoft Warbird with the MSVC compiler☆112Updated 2 years ago