hardenedvault / bootkit-samplesLinks
Bootkit sample for firmware attack
☆260Updated 11 months ago
Alternatives and similar repositories for bootkit-samples
Users that are interested in bootkit-samples are comparing it to the libraries listed below
Sorting:
- baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability☆345Updated 2 years ago
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆189Updated 2 months ago
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆260Updated 2 years ago
- Academic project of Linux rootkit made for Bachelor Engineering Thesis.☆113Updated last year
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆228Updated 2 years ago
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆466Updated 4 months ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆126Updated 2 years ago
- A comprehensive Hypervisor resources repo☆176Updated 3 weeks ago
- My notes while studying Windows exploitation☆190Updated 2 years ago
- Kernel Exploits☆260Updated 4 years ago
- A DTrace on Windows Reimplementation☆362Updated 3 weeks ago
- LD_PRELOAD rootkit☆137Updated last year
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- A golang CLI tool to download malware from a variety of sources.☆150Updated 3 months ago
- A Binary Genetic Traits Lexer Framework☆515Updated 2 months ago
- Research notes☆128Updated 10 months ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆72Updated 3 years ago
- "Screwed Drivers" centralized information source for code references, links, etc.☆369Updated 5 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- Code snips and notes☆137Updated 3 years ago
- Assortment of hashing algorithms used in malware☆382Updated this week
- ROPfuscator is a fine-grained code obfuscation framework for C/C++ programs using ROP (return-oriented programming).☆432Updated last year
- Expriments☆474Updated last year
- Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks☆341Updated last year
- Writeups for CTF challenges☆32Updated last year
- A curated list of awesome Windows Exploitation resources, and shiny things.☆80Updated 8 years ago
- Binarly Vulnerability Research Advisories☆181Updated 2 weeks ago
- Venom is a library that meant to perform evasive communication using stolen browser socket☆392Updated 2 years ago
- Vulnerable driver research tool, result and exploit PoCs☆219Updated 2 years ago
- UEFI and SMM Assessment Tool☆204Updated 11 months ago