hackedteam / vector-edkLinks
EFI Development Kit
☆141Updated 9 years ago
Alternatives and similar repositories for vector-edk
Users that are interested in vector-edk are comparing it to the libraries listed below
Sorting:
- PEI stage backdoor for UEFI compatible firmware☆221Updated 4 years ago
- The runtime DXE driver monitoring access to the UEFI variables by hooking the runtime service table.☆142Updated 4 years ago
- PC firmware exploitation tool and library☆254Updated 3 years ago
- UEFI bootkit☆247Updated 12 years ago
- TDL4 style rootkit to spoof read/write requests to master boot record☆131Updated 7 years ago
- Helper plugin for analyzing UEFI firmware☆90Updated last year
- System Management RAM analysis tool☆78Updated 9 months ago
- Some scripts for IDA Pro to assist with reverse engineering EFI binaries☆299Updated 6 years ago
- The history of Windows Internals via symbols.☆178Updated 3 years ago
- Windows XP 32-Bit Bootkit☆145Updated 10 years ago
- Elevation of privilege detector based on HyperPlatform☆122Updated 8 years ago
- Driver Initial Reconnaissance Tool☆123Updated 5 years ago
- Some scripts for IDA Pro to assist with reverse engineering EFI binaries☆75Updated 9 years ago
- Hypervisor-based debugger☆189Updated 4 years ago
- EFI DXE Emulator and Interactive Debugger☆85Updated 5 years ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆97Updated 8 years ago
- ☆66Updated 6 years ago
- Rovnix Bootkit☆118Updated 10 years ago
- IDA Plugin which decodes Windows Device I/O control code into DeviceType, FunctionCode, AccessType and MethodType.☆110Updated last year
- Multi-purpose proof-of-concept tool based on CPU-Z CVE-2017-15303☆109Updated 7 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆435Updated 6 years ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆140Updated 4 years ago
- A small bootkit which does not rely on x64 assembly.☆488Updated 5 years ago
- Scout backdoor for Windows☆115Updated 9 years ago
- Toy scripts for playing with WinDbg JS API☆228Updated 10 months ago
- ☆106Updated 6 years ago
- Loading unsigned code into kernel in Windows 10 (64) with help of VMware Workstation Pro/Player design flaw☆136Updated 8 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆298Updated 6 years ago
- Information about a signed UEFI Shell that can be used when Secure Boot is enabled.☆78Updated 4 years ago
- MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x and EPT features. M…☆226Updated 4 years ago