Pdawg-bytes / UEFIBootKitLinks
A simple UEFI bootkit made by @NSG650 and me.
☆25Updated 5 months ago
Alternatives and similar repositories for UEFIBootKit
Users that are interested in UEFIBootKit are comparing it to the libraries listed below
Sorting:
- A few examples of how to trap virtual memory access on Windows.☆31Updated 6 months ago
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Updated 8 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated last year
- A fully compatible replacement of Windows NT NtCreateLowBoxToken syscall - precisely restored from reverse engineering☆38Updated 2 weeks ago
- ☆40Updated 4 months ago
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆24Updated 2 weeks ago
- ☆20Updated 5 months ago
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆28Updated 2 months ago
- Example payload for CVE-2022-21894☆14Updated last year
- Mentally ill EtwTi parser☆38Updated 3 months ago
- ☆31Updated 2 months ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Updated last year
- ☆31Updated last year
- ☆48Updated 3 months ago
- NailaoLoader: Hiding Execution Flow via Patching☆21Updated 3 months ago
- Report and exploit of CVE-2024-21305.☆36Updated last year
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆30Updated 10 months ago
- Reports on Driver, LSASS and other security services mitigations☆16Updated 2 months ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- ☆15Updated last week
- Remove WPP calls from hexrays decompiled code☆49Updated 2 months ago
- ☆30Updated 6 months ago
- A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using Instrumentation…☆31Updated last year
- Proof-of-Concept for CVE-2024-26218☆51Updated last year
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆78Updated this week
- ☆18Updated 4 months ago
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆31Updated last year
- An Obfuscator-LLVM based mingw-w64 toolchain.☆40Updated 3 years ago
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆50Updated last year
- ☆11Updated 3 years ago