SpiralBL0CK / BlackLotus-analysis-stage2-bootkit-rootkit-stageLinks
Z2A-BlackLotus Challenge stage 2 bootkit-rootkit analysis
☆17Updated 2 years ago
Alternatives and similar repositories for BlackLotus-analysis-stage2-bootkit-rootkit-stage
Users that are interested in BlackLotus-analysis-stage2-bootkit-rootkit-stage are comparing it to the libraries listed below
Sorting:
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated last year
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- Report and exploit of CVE-2024-21305.☆34Updated last year
- A simple commandline application to automatically decrypt strings from Obfuscator protected binaries☆45Updated 11 months ago
- ☆44Updated last year
- Windows KASLR bypass using prefetch side-channel☆100Updated last year
- using the gpu to hide your payload☆58Updated 2 years ago
- Example payload for CVE-2022-21894☆15Updated last year
- A dynamic unpacking tool☆136Updated last year
- ☆25Updated 7 months ago
- A journal for $6,000 Riot Vanguard bounty.☆63Updated last year
- Proof-of-Concept for CVE-2024-26218☆51Updated last year
- The Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples.☆63Updated last year
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆28Updated 10 months ago
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆25Updated 8 months ago
- PoC of a UEFI Petya ransomware☆43Updated 2 years ago
- AES-256 Microsoft Cryptography API Example Use.☆30Updated last year
- LPE exploit for CVE-2023-36802☆22Updated last year
- This IDA plugin extends the functionality of the assembly and hex view. With this plugin, you can conveniently decode/decrypt/alter data …☆81Updated last week
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Updated 7 months ago
- Dreg's setup for lldb reversing. The simplest and easiest possible, without scripting. lldb debugging setup.☆14Updated last year
- BINARLY Research Tools and PoCs☆36Updated 8 months ago
- Report and exploit of CVE-2023-36427☆90Updated last year
- Plugin interface for remote communications with Binary Ninja database and MCP server for interfacing with LLMs.☆34Updated 2 weeks ago
- A few examples of how to trap virtual memory access on Windows.☆30Updated 5 months ago
- UEFI bootkit: Hardware Implant. In-Progress☆15Updated 3 years ago
- ☆46Updated 2 months ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year