jussihi / SMM-RootkitLinks
SMM rootkit similar to LoJax or MosaicRegressor
☆137Updated last year
Alternatives and similar repositories for SMM-Rootkit
Users that are interested in SMM-Rootkit are comparing it to the libraries listed below
Sorting:
- SMM UEFI module and client for UMD privilege escalation☆59Updated 4 months ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆159Updated 2 years ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆129Updated 2 years ago
- Another UEFI runtime bootkit☆31Updated 2 years ago
- Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board☆92Updated last year
- SMM driver/rootkit for platform memory access with R3 <-> R0 <-> R-2 communication.☆95Updated 11 months ago
- uefi diskless persistence technique + OVMF secureboot bypass☆93Updated last year
- Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks☆342Updated last year
- A simple Windows kernel rootkit.☆94Updated 4 months ago
- A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)☆88Updated 2 years ago
- ☆153Updated 5 years ago
- Compact MBR Bootkit for Windows☆54Updated 3 years ago
- EFI bootkit for loading unsigned drivers☆20Updated last year
- ☆37Updated 3 years ago
- Tool to dump EFI runtime drivers.☆38Updated last year
- Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling withou…☆233Updated 11 months ago
- Advanced driver monitoring utility.☆217Updated 3 years ago
- Tool to dump UEFI runtime drivers implementing runtime services for Windows☆108Updated 4 years ago
- a minimalistic windows hypervisor for amd processors☆126Updated 3 years ago
- Exploit MsIo vulnerable driver☆113Updated 4 years ago
- Using Windows' own bootloader as a shim to bypass Secure Boot☆187Updated last year
- bypassing intel txt's tboot integrity checks via coreboot shim☆81Updated 6 months ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆255Updated 3 years ago
- Bypassing PatchGuard on modern x64 systems☆267Updated 2 years ago
- Detects virtual machines and malware analysis environments☆138Updated 2 years ago
- ☆245Updated last month
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆233Updated 5 years ago
- Load your driver like win32k.sys☆256Updated 3 years ago
- Win64 UEFI Driver-based tool for unrestricted memory R/W☆29Updated 3 years ago
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆167Updated last month