hackedteam / vector-edk
EFI Development Kit
☆139Updated 9 years ago
Alternatives and similar repositories for vector-edk:
Users that are interested in vector-edk are comparing it to the libraries listed below
- The runtime DXE driver monitoring access to the UEFI variables by hooking the runtime service table.☆138Updated 4 years ago
- UEFI bootkit☆244Updated 11 years ago
- TDL4 style rootkit to spoof read/write requests to master boot record☆130Updated 7 years ago
- PC firmware exploitation tool and library☆251Updated 2 years ago
- PEI stage backdoor for UEFI compatible firmware☆219Updated 3 years ago
- System Management RAM analysis tool☆76Updated 7 months ago
- Windows XP 32-Bit Bootkit☆144Updated 10 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆430Updated 6 years ago
- Hyper-V Research is trendy now☆159Updated last week
- ☆62Updated 5 years ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆137Updated 3 years ago
- Source from VMDE paper, adapted to 2015☆181Updated 7 years ago
- Hypervisor-based debugger☆187Updated 4 years ago
- An analysis of the Warbird virtual-machine protection for the CI!g_pStore☆246Updated 7 years ago
- Elevation of privilege detector based on HyperPlatform☆120Updated 8 years ago
- MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x and EPT features. M…☆223Updated 4 years ago
- Hyper-V Research is trendy now☆178Updated 10 months ago
- Some scripts for IDA Pro to assist with reverse engineering EFI binaries☆296Updated 5 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆294Updated 6 years ago
- ☆104Updated 5 years ago
- TLB splitting VMM☆164Updated 8 years ago
- Rovnix Bootkit☆119Updated 10 years ago
- The history of Windows Internals via symbols.☆177Updated 3 years ago
- Automatically exported from code.google.com/p/ioctlfuzzer☆160Updated 9 years ago
- CHIPSEC module that exploits UEFI boot script table vulnerability☆133Updated 9 years ago
- A library for intercepting native functions by hooking KiFastSystemCall☆72Updated 4 years ago
- Multi-purpose proof-of-concept tool based on CPU-Z CVE-2017-15303☆109Updated 7 years ago
- Loading unsigned code into kernel in Windows 10 (64) with help of VMware Workstation Pro/Player design flaw☆135Updated 7 years ago
- Driver Initial Reconnaissance Tool☆122Updated 5 years ago
- Win64/Rovnix - Volume Boot Record Bootkit☆171Updated 9 years ago