SamuelTulach / SecureFakePkg
Simple EFI runtime driver that hooks GetVariable function and returns data expected by Windows to make it think that it's running with secure boot enabled (faking secure boot)
☆132Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for SecureFakePkg
- Guide for patching AMI Aptio V UEFI firmware to circumvent Secure Boot checks☆100Updated 5 months ago
- Minimalistic AMD-V/SVM hypervisor with memory introspection capabilities☆182Updated 5 months ago
- alternative smm driver for ryzen motherboards☆109Updated last month
- Kernel driver for detecting Intel VT-x hypervisors.☆171Updated last year
- manually map driver for a signed driver memory space☆138Updated 3 years ago
- Hide SMBIOS/disk/NIC serials from EFI bootkit☆280Updated 3 years ago
- Using CVE-2021-40449 to manual map kernel mode driver☆99Updated 2 years ago
- a minimalistic windows hypervisor for amd processors☆98Updated 2 years ago
- Disks for DMA☆98Updated 3 years ago
- ☆139Updated 3 years ago
- Intercepting DeviceControl via WPP☆128Updated 5 years ago
- base for testing☆156Updated last month
- Simple mmapper which using UEFI runtime driver.☆79Updated 5 years ago
- ☆92Updated 3 weeks ago
- just proof of concept. hooking MmCopyMemory PG safe.☆63Updated last year
- Kernel Lazy Importer☆111Updated 7 months ago
- Allows you to communicate with the kernel mode to manipulate memory in a stealthy way to avoid kernel anticheats.☆168Updated 2 years ago
- Drawing from kernelmode without any hooks☆159Updated 2 years ago
- 09/2021 reversal of EasyAntiCheat driver☆204Updated 2 years ago
- Check your detection vectors☆137Updated this week
- Kernel driver that uses Shared memory to communicate with UserMode☆84Updated 5 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆121Updated 2 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆77Updated 3 years ago
- ☆132Updated 10 months ago
- A proof of concept demonstrating communication via mapped shared memory structures between a user-mode process and a kernel-mode payload …☆74Updated 3 years ago
- Voyager - A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)☆228Updated last year
- Proof of concept on how to bypass some limitations of a manual mapped driver☆164Updated 4 years ago
- PE-Dump-Fixer☆103Updated 4 years ago
- load unsigned kernel-driver by patching dse in 248 lines☆110Updated 8 months ago