hardenedvault / bootkit-samplesLinks
Bootkit sample for firmware attack
☆259Updated 9 months ago
Alternatives and similar repositories for bootkit-samples
Users that are interested in bootkit-samples are comparing it to the libraries listed below
Sorting:
- baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability☆341Updated last year
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆189Updated last month
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆258Updated last year
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆418Updated 2 months ago
- Kernel Exploits☆259Updated 4 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆227Updated 2 years ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- A comprehensive Hypervisor resources repo☆118Updated 2 weeks ago
- Binarly Vulnerability Research Advisories☆180Updated last week
- Vulnerable driver research tool, result and exploit PoCs☆215Updated last year
- Static Binary Instrumentation tool for Windows x64 executables☆205Updated 4 months ago
- A golang CLI tool to download malware from a variety of sources.☆150Updated 2 months ago
- Academic project of Linux rootkit made for Bachelor Engineering Thesis.☆109Updated last year
- Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks☆341Updated last year
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- A Binary Genetic Traits Lexer Framework☆515Updated last month
- Recon 2023 slides and code☆79Updated 2 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆73Updated 2 years ago
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆235Updated 4 months ago
- A DTrace on Windows Reimplementation☆358Updated 7 months ago
- My notes while studying Windows exploitation☆190Updated 2 years ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆433Updated last year
- Comprehensive toolkit for Ghidra headless.☆359Updated 5 months ago
- ☆96Updated 3 years ago
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆173Updated 5 months ago
- ROPfuscator is a fine-grained code obfuscation framework for C/C++ programs using ROP (return-oriented programming).☆432Updated last year
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆241Updated last year
- ☆163Updated 4 years ago
- Code snips and notes☆136Updated 3 years ago
- UEFI and SMM Assessment Tool☆199Updated 9 months ago