cppio / uefi-backdoorLinks
A UEFI Application that hooks SetVariable to allow a user-space program to access kernel memory.
☆20Updated 5 years ago
Alternatives and similar repositories for uefi-backdoor
Users that are interested in uefi-backdoor are comparing it to the libraries listed below
Sorting:
- Take back control of Windows Code Integrity, no exploits or patching required! Requires that you control your own Platform Key (PK).☆50Updated 3 years ago
- Unicorn Engine port for UEFI firmware☆50Updated 10 months ago
- Runtime smm module loader☆35Updated 3 years ago
- A thin introspection hypervisor framework that allows for low level resource manipulation.☆12Updated 2 years ago
- UEFI UEFI UEFI☆47Updated 2 years ago
- Simple Intel VT-x type-2 hypervisor for 64-bit Linux.☆19Updated 5 years ago
- The simple UEFI application to create a Windows Platform Binary Table (WPBT) from the UEFI shell.☆120Updated 4 years ago
- A bootkit to bypass Windows login (WIP)☆10Updated 2 years ago
- Template for UEFI runtime drivers written in Rust with serial logging and debugging support.☆61Updated 5 years ago
- ☆24Updated 4 years ago
- Hardware Spoofing & VirtualBox-Hardening x64 Bootkit☆18Updated 3 years ago
- Simple PoC for a bootkit written as a UEFI Option ROM Driver☆11Updated 3 years ago
- x86_64, PE32+, FAT32 bootloader☆26Updated 4 years ago
- Win64 UEFI Driver-based tool for unrestricted memory R/W☆30Updated 3 years ago
- amd hypervisor☆48Updated 6 months ago
- Simple demo of accessing System Management BIOS in UEFI environment.☆14Updated 5 years ago
- IDA's Lumina feature, reimplemented for Binary Ninja, with new error handeling!☆37Updated last year
- AMD SVM hypervisor rootkit proof of concept☆48Updated 2 years ago
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆41Updated 2 years ago
- Research on obfuscated licensing APIs / CLIP service in the Windows kernel☆136Updated 3 years ago
- Playing with LLVM passes☆40Updated 2 years ago
- ASUSTeK AsIO3 I/O driver unlock☆23Updated 4 years ago
- Binary Ninja plugin to perform automated analysis of Windows drivers☆20Updated 6 years ago
- IDB parser☆22Updated 2 months ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Updated 3 years ago
- Binja loader for AMD-SP or PSP firmware binaries.☆41Updated 3 years ago
- ☆41Updated 3 years ago
- Collaboration platform for reverse engineering tools.☆46Updated last year
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆90Updated last year
- A Binary Ninja plugin to deobfuscate Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆38Updated last year