jussihi / SMM-Rootkit
SMM rootkit similar to LoJax or MosaicRegressor
☆117Updated last year
Alternatives and similar repositories for SMM-Rootkit:
Users that are interested in SMM-Rootkit are comparing it to the libraries listed below
- SMM UEFI module and client for UMD privilege escalation☆43Updated last year
- uefi diskless persistence technique + OVMF secureboot bypass☆61Updated last year
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆139Updated 4 years ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆143Updated 2 years ago
- Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks☆316Updated last year
- A simple Windows kernel rootkit.☆93Updated last year
- Another UEFI runtime bootkit☆30Updated 2 years ago
- Compact MBR Bootkit for Windows☆47Updated 3 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆245Updated 2 years ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆120Updated 2 years ago
- Advanced driver monitoring utility.☆208Updated 2 years ago
- ☆143Updated last year
- Code Injection, Inject malicious payload via pagetables pml4.☆237Updated 3 years ago
- ☆152Updated 5 years ago
- bypassing intel txt's tboot integrity checks via coreboot shim☆66Updated last month
- Tool to dump EFI runtime drivers.☆35Updated last year
- SMM driver/rootkit for platform memory access with R3 <-> R0 <-> R-2 communication.☆85Updated 6 months ago
- A native hypervisor designed for the Windows operating system☆123Updated 4 years ago
- The sample DXE runtime driver demonstrating how to program DMA remapping.☆58Updated last year
- Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling withou…☆199Updated 6 months ago
- Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board☆78Updated last year
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆80Updated 6 months ago
- A small bootkit which does not rely on x64 assembly.☆481Updated 5 years ago
- ☆189Updated last week
- Resolve DOS MZ executable symbols at runtime☆95Updated 3 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆217Updated 5 years ago
- Reverse engineered source code of the autochk rootkit☆202Updated 5 years ago
- Kernel driver for detecting Intel VT-x hypervisors.☆184Updated last year
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆92Updated 3 years ago
- Hooking Windows' exception dispatcher to protect process's PML4☆167Updated 3 months ago