cppio / uefi-backdoorLinks
A UEFI Application that hooks SetVariable to allow a user-space program to access kernel memory.
☆19Updated 5 years ago
Alternatives and similar repositories for uefi-backdoor
Users that are interested in uefi-backdoor are comparing it to the libraries listed below
Sorting:
- UEFI UEFI UEFI☆40Updated 2 years ago
- Runtime smm module loader☆35Updated 2 years ago
- Unicorn Engine port for UEFI firmware☆47Updated 7 months ago
- Take back control of Windows Code Integrity, no exploits or patching required! Requires that you control your own Platform Key (PK).☆49Updated 3 years ago
- A thin introspection hypervisor framework that allows for low level resource manipulation.☆13Updated last year
- Simple demo of accessing System Management BIOS in UEFI environment.☆14Updated 5 years ago
- ☆24Updated 4 years ago
- Simple Intel VT-x type-2 hypervisor for 64-bit Linux.☆20Updated 5 years ago
- The simple UEFI application to create a Windows Platform Binary Table (WPBT) from the UEFI shell.☆120Updated 4 years ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Updated 3 years ago
- Template for UEFI runtime drivers written in Rust with serial logging and debugging support.☆61Updated 5 years ago
- Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board☆94Updated 2 years ago
- Binja loader for AMD-SP or PSP firmware binaries.☆39Updated 2 years ago
- Hardware Spoofing & VirtualBox-Hardening x64 Bootkit☆17Updated 2 years ago
- System Management RAM analysis tool☆83Updated last year
- Win64 UEFI Driver-based tool for unrestricted memory R/W☆29Updated 3 years ago
- Collaboration platform for reverse engineering tools.☆44Updated 10 months ago
- UEFI Video Card ROM Extractor☆61Updated 10 years ago
- ASUSTeK AsIO3 I/O driver unlock☆23Updated 4 years ago
- AMD SVM hypervisor rootkit proof of concept☆47Updated 2 years ago
- IDA plugin to recover source code from panic information on rust☆17Updated 5 months ago
- Exploit POC for CVE-2024-36877☆47Updated last year
- Documentation of Microsoft's Warbird obfuscation☆52Updated last year
- A bootkit to bypass Windows login (WIP)☆10Updated 2 years ago
- The program is intended for a dynamic unpacking of binders, crypters, packers and protectors☆10Updated 5 years ago
- Research on obfuscated licensing APIs / CLIP service in the Windows kernel☆122Updated 3 years ago
- Ghidra P-Code emulation and static LLVM lifting in Python☆33Updated 3 years ago
- Simple PoC for a bootkit written as a UEFI Option ROM Driver☆11Updated 3 years ago
- Information about a signed UEFI Shell that can be used when Secure Boot is enabled.☆83Updated 4 years ago
- x86_64, PE32+, FAT32 bootloader☆26Updated 4 years ago