hackedteam / vector-edkLinks
EFI Development Kit
☆149Updated 10 years ago
Alternatives and similar repositories for vector-edk
Users that are interested in vector-edk are comparing it to the libraries listed below
Sorting:
- UEFI bootkit☆248Updated 12 years ago
- PEI stage backdoor for UEFI compatible firmware☆227Updated 4 years ago
- TDL4 style rootkit to spoof read/write requests to master boot record☆133Updated 8 years ago
- The runtime DXE driver monitoring access to the UEFI variables by hooking the runtime service table.☆146Updated 5 years ago
- PC firmware exploitation tool and library☆258Updated 3 years ago
- Windows XP 32-Bit Bootkit☆145Updated 11 years ago
- Rovnix Bootkit☆123Updated 10 years ago
- System Management RAM analysis tool☆83Updated last year
- Elevation of privilege detector based on HyperPlatform☆123Updated 8 years ago
- ☆68Updated 6 years ago
- Source from VMDE paper, adapted to 2015☆189Updated 8 years ago
- ☆110Updated 6 years ago
- Multi-purpose proof-of-concept tool based on CPU-Z CVE-2017-15303☆111Updated 7 years ago
- My repository to upload drivers from different books and all the information related to windows internals.☆163Updated 6 years ago
- Driver Initial Reconnaissance Tool☆126Updated 6 years ago
- Hypervisor based tool for monitoring system register accesses.☆152Updated 7 years ago
- Scout backdoor for Windows☆116Updated 10 years ago
- Windbg extension to find PatchGuard pages☆123Updated 11 years ago
- Signing keys☆95Updated 10 years ago
- The history of Windows Internals via symbols.☆181Updated 4 years ago
- Win64/Rovnix - Volume Boot Record Bootkit☆177Updated 10 years ago
- SentinelOne's KeRnel Exploits Advanced Mitigations☆54Updated 7 years ago
- A library for intercepting native functions by hooking KiFastSystemCall☆74Updated 5 years ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆76Updated 9 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆185Updated 6 years ago
- ZeroAccess v3 toolkit☆166Updated 8 years ago
- Hidden kernel mode code execution for bypassing modern anti-rootkits.☆84Updated 15 years ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆102Updated 8 years ago
- Windows NT ioctl bruteforcer and modular fuzzer☆125Updated 7 years ago
- Two IDAPython Scripts help you to reconstruct Microsoft COM (Component Object Model) Code☆184Updated 5 years ago