b-irb / PigPEILinks
PEIM (UEFI) bootkit targeting OVMF (EDK2)
☆40Updated last year
Alternatives and similar repositories for PigPEI
Users that are interested in PigPEI are comparing it to the libraries listed below
Sorting:
- PDB Rewriting Rust Library☆25Updated last year
- Rust bindings to the System Informer's (formerly known as Process Hacker) "phnt" native Windows headers☆47Updated 4 months ago
- Generate a PDB file given the old PDB file and an address mapping☆49Updated 2 months ago
- Windows Minidump loader for Ghidra☆29Updated 3 years ago
- A KISS Rust crate to parse Windows kernel crash-dumps created by Windows & its debugger.☆39Updated last month
- Rust library for lifting raw binary data to LLVM IR☆59Updated 3 months ago
- Report and exploit of CVE-2024-21305.☆38Updated last year
- Rust bindings for VMProtect.☆26Updated last year
- Report and exploit of CVE-2023-36427☆88Updated last year
- Cargo subcommand to build a crate into shellcode☆24Updated last year
- dynamic binary instrumentation, analysis, and patching framework☆95Updated last month
- IDA plugin to recover source code from panic information on rust☆17Updated 5 months ago
- A set of LLVM and GCC based plugins that perform code obfuscation.☆132Updated this week
- WslinkVMAnalyzer is a tool to facilitate analysis of code protected by a virtual machine featured in Wslink malware☆46Updated 3 years ago
- Sample Rust crate used to implement a VBS enclave in Rust☆35Updated 4 months ago
- ☆94Updated last year
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆97Updated last year
- A thin introspection hypervisor framework that allows for low level resource manipulation.☆13Updated last year
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆86Updated 3 years ago
- Abusing exceptions for code execution.☆113Updated 2 years ago
- x86-64 virtualizing obfuscator written in Rust☆76Updated last year
- Playing with LLVM passes☆37Updated 2 years ago
- A few examples of how to trap virtual memory access on Windows.☆34Updated 10 months ago
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆43Updated 11 months ago
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆53Updated last month
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆23Updated last year
- ☆24Updated last week
- A minimalistic logger for Windows Kernel Drivers.☆25Updated last year
- ☆22Updated 2 years ago
- LLVM based obfuscation engine☆100Updated 4 months ago