connormorley / OuterHaven-UEFI-exploitation-and-detectionLinks
A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting when extracting NVRAM buffer from the ntdll library function and underlying runtime service. This is working on Windows 7 - 10 in testing.
☆10Updated 2 years ago
Alternatives and similar repositories for OuterHaven-UEFI-exploitation-and-detection
Users that are interested in OuterHaven-UEFI-exploitation-and-detection are comparing it to the libraries listed below
Sorting:
- PCILeech HP iLO4 Service☆25Updated 6 years ago
- ☆13Updated 6 years ago
- Configure SPI flash write protection.☆24Updated 5 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 4 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 4 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆31Updated 5 years ago
- ☆11Updated 3 years ago
- SPI flash read MitM attack PoC☆40Updated 3 years ago
- ☆17Updated 5 years ago
- Rekall Memory Forensic Framework☆33Updated 6 years ago
- PANDA-powered tracing engine for tenet☆11Updated 3 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- Python interface for Binexport, the Bindiff export format☆19Updated last week
- 802.15.4 Fuzzer☆21Updated 6 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Linux-KVM with rVMI extensions☆22Updated 8 years ago
- One Bootloader to Load Them All - Research materials, Code , Etc.☆61Updated 3 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- The Multiplatform Linux Sandbox☆16Updated 2 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆14Updated 5 years ago
- ☆24Updated 6 years ago
- Skeleton project for your own GRUB-based bootkit☆16Updated 5 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 7 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Updated 7 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Updated 7 years ago
- Crystal Anti-Exploit Protection 2012☆37Updated 5 years ago
- Working Set Page Cache side-channel IPC PoC☆68Updated 6 years ago
- Breaking Secure Boot with SMM☆41Updated 3 years ago