hardenedvault / bootkit-samplesLinks
Bootkit sample for firmware attack
☆266Updated last year
Alternatives and similar repositories for bootkit-samples
Users that are interested in bootkit-samples are comparing it to the libraries listed below
Sorting:
- baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability☆347Updated 2 years ago
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆192Updated 6 months ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆236Updated 2 years ago
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆263Updated 2 months ago
- Kernel Exploits☆260Updated 4 years ago
- Academic project of Linux rootkit made for Bachelor Engineering Thesis.☆117Updated last year
- Find patterns of vulnerabilities on Windows in order to find 0-day and write exploits of 1-days. We use Microsoft security updates in ord…☆191Updated 4 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆72Updated 3 years ago
- The FLARE team's open-source library to disassemble Common Intermediate Language (CIL) instructions.☆171Updated 2 weeks ago
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆478Updated 7 months ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- My notes while studying Windows exploitation☆193Updated 2 years ago
- Binarly Vulnerability Research Advisories☆185Updated last week
- A Binary Genetic Traits Lexer Framework☆521Updated 5 months ago
- ☆140Updated 4 years ago
- Comprehensive toolkit for Ghidra headless.☆363Updated 9 months ago
- Code snips and notes☆140Updated 3 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆146Updated 3 years ago
- A DTrace on Windows Reimplementation☆369Updated 4 months ago
- Research notes☆131Updated last year
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆91Updated 2 years ago
- ASLR bypass without infoleak☆167Updated 4 years ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆127Updated 2 years ago
- A comprehensive Hypervisor resources repo☆189Updated 3 months ago
- ROPfuscator is a fine-grained code obfuscation framework for C/C++ programs using ROP (return-oriented programming).☆437Updated last year
- Vulnerable driver research tool, result and exploit PoCs☆228Updated 2 years ago
- ☆98Updated 4 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆85Updated 8 years ago
- "Screwed Drivers" centralized information source for code references, links, etc.☆372Updated 5 years ago
- Recon 2023 slides and code☆80Updated 2 years ago