b-irb / PigPEILinks
PEIM (UEFI) bootkit targeting OVMF (EDK2)
☆42Updated last year
Alternatives and similar repositories for PigPEI
Users that are interested in PigPEI are comparing it to the libraries listed below
Sorting:
- PDB Rewriting Rust Library☆25Updated last year
- A KISS Rust crate to parse Windows kernel crash-dumps created by Windows & its debugger.☆40Updated 3 weeks ago
- Generate a PDB file given the old PDB file and an address mapping☆49Updated 3 months ago
- Rust bindings to the System Informer's (formerly known as Process Hacker) "phnt" native Windows headers☆47Updated 5 months ago
- Report and exploit of CVE-2024-21305.☆38Updated last year
- Windows Minidump loader for Ghidra☆29Updated 3 years ago
- A set of LLVM and GCC based plugins that perform code obfuscation.☆132Updated 3 weeks ago
- Rust library for lifting raw binary data to LLVM IR☆60Updated 3 months ago
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆67Updated 2 months ago
- dynamic binary instrumentation, analysis, and patching framework☆95Updated last month
- rekk is set of tools written in Rust to obfuscate ELF & PE executables with nanomites.☆31Updated 10 months ago
- ntoskrnl.exe and bootmgfw.efi obfuscated with CodeDefender☆49Updated 3 weeks ago
- Sample Rust crate used to implement a VBS enclave in Rust☆36Updated 5 months ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆97Updated last year
- A minimalistic logger for Windows Kernel Drivers.☆25Updated last year
- Report and exploit of CVE-2023-36427☆89Updated last year
- IDA plugin to recover source code from panic information on rust☆17Updated 6 months ago
- Cargo subcommand to build a crate into shellcode☆24Updated last year
- Abusing exceptions for code execution.☆113Updated 2 years ago
- Binary Ninja plugin to perform automated analysis of Windows drivers☆18Updated 6 years ago
- Safe Rust bindings for the COM interfaces of the Windows debugging engine☆15Updated last week
- Rule Engine for Dynamic Malware Analysis and Research☆25Updated 6 months ago
- ☆25Updated last month
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆35Updated 3 years ago
- WslinkVMAnalyzer is a tool to facilitate analysis of code protected by a virtual machine featured in Wslink malware☆46Updated 3 years ago
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆98Updated 5 months ago
- x86-64 virtualizing obfuscator written in Rust☆76Updated last year
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆45Updated last year
- A few examples of how to trap virtual memory access on Windows.☆35Updated 10 months ago
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆86Updated 3 years ago