Bootkit sample for firmware attack
☆267Dec 1, 2024Updated last year
Alternatives and similar repositories for bootkit-samples
Users that are interested in bootkit-samples are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆242May 2, 2025Updated 11 months ago
- A small bootkit which does not rely on x64 assembly.☆522Aug 29, 2019Updated 6 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Mar 28, 2022Updated 4 years ago
- Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.☆943Mar 29, 2022Updated 4 years ago
- A care package of useful bofs for red team engagments☆53Dec 6, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆249Jul 9, 2024Updated last year
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆268Aug 31, 2022Updated 3 years ago
- Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus)☆570Sep 12, 2023Updated 2 years ago
- baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability☆352Sep 27, 2023Updated 2 years ago
- ☆20Mar 21, 2024Updated 2 years ago
- Small PoC of using a Microsoft signed executable as a lolbin.☆141Feb 27, 2023Updated 3 years ago
- Detect strange memory regions and DLLs☆190Jan 20, 2022Updated 4 years ago
- PCI Express DIY hacking toolkit for Xilinx SP605. This repository is also home of Hyper-V Backdoor and Boot Backdoor, check readme for li…☆867Mar 7, 2026Updated last month
- ☆59Jun 8, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- ☆138Apr 20, 2023Updated 3 years ago
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆161Sep 3, 2022Updated 3 years ago
- This novel way of using NtQueueApcThreadEx by abusing the ApcRoutine and SystemArgument[0-3] parameters by passing a random pop r32; ret …☆265Apr 29, 2023Updated 2 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆115May 21, 2023Updated 2 years ago
- ☆70Feb 6, 2025Updated last year
- ☆319May 16, 2022Updated 3 years ago
- ☆48Feb 11, 2023Updated 3 years ago
- Breaking Secure Boot with SMM☆41Apr 5, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Static Binary Instrumentation tool for Windows x64 executables☆205Sep 29, 2025Updated 6 months ago
- ☆209Mar 22, 2021Updated 5 years ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆534Aug 1, 2022Updated 3 years ago
- PoCs for Kernelmode rootkit techniques research.☆436Mar 25, 2026Updated 3 weeks ago
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆907Mar 25, 2026Updated 3 weeks ago
- Now You See Me, Now You Don't☆1,042Jan 23, 2026Updated 2 months ago
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆721Aug 5, 2020Updated 5 years ago
- ☆96Jun 18, 2024Updated last year
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆673Dec 23, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- UEFI and SMM Assessment Tool☆216Nov 21, 2024Updated last year
- A simple password-based PE encryptor for Windows 32-bit executables.☆51Jan 9, 2025Updated last year
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆70Mar 25, 2022Updated 4 years ago
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Aug 7, 2024Updated last year
- Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks☆361Nov 3, 2023Updated 2 years ago
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆243Sep 26, 2023Updated 2 years ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆243Mar 12, 2024Updated 2 years ago