evgind / lojax_uefi_rootkit_checkerLinks
lojax_uefi_rootkit_checker
☆18Updated 6 years ago
Alternatives and similar repositories for lojax_uefi_rootkit_checker
Users that are interested in lojax_uefi_rootkit_checker are comparing it to the libraries listed below
Sorting:
- repository with additional materials and source code☆31Updated 8 years ago
- CVE-2017-5721 Proof-of-Concept☆17Updated 7 years ago
- LPE exploits for Secret Net and Secret Net Studio☆51Updated 9 years ago
- An EFI image parser and dissector☆52Updated 12 years ago
- Tools for communicating with Intel Management Engine through MEI (HECI)☆13Updated 8 years ago
- Primitive TE to PE32 converter☆38Updated 7 months ago
- 来自Freebuf评论区,一个UEFI马.☆49Updated 8 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- ☆27Updated 9 years ago
- System Management RAM analysis tool☆83Updated last year
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆68Updated 8 years ago
- Sample showing the use of CoGetInterceptor☆22Updated 4 years ago
- Windows hard shutdown shellcode. Don't need administrator rights.☆13Updated 9 years ago
- ☆26Updated 6 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆40Updated 11 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Updated 7 years ago
- https://blog.xpnsec.com/windows-warbird-privesc/☆31Updated 7 years ago
- Tools for viewing and extracting HDD firmware files☆75Updated 11 years ago
- ☆74Updated 7 years ago
- UEFI Hypervisor☆21Updated 9 years ago
- Bootkits Revisited☆40Updated 11 years ago
- A minimal tool to extract shellcode from 64-bit PE binaries.☆51Updated 4 years ago
- Some scripts for IDA Pro to assist with reverse engineering EFI binaries☆79Updated 10 years ago
- Python-based interactive assembler/disassembler CLI, powered by Keystone/Capstone.☆31Updated 8 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 12 years ago
- ☆13Updated 6 years ago
- hidusb.sys source code, Windows 10 hidusb.sys fully reversed☆34Updated 8 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 8 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago