jussihi / SMM-RootkitLinks
SMM rootkit similar to LoJax or MosaicRegressor
☆131Updated last year
Alternatives and similar repositories for SMM-Rootkit
Users that are interested in SMM-Rootkit are comparing it to the libraries listed below
Sorting:
- SMM UEFI module and client for UMD privilege escalation☆54Updated 2 months ago
- Another UEFI runtime bootkit☆30Updated 2 years ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆154Updated 2 years ago
- Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board☆89Updated last year
- Using Windows' own bootloader as a shim to bypass Secure Boot☆182Updated last year
- Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks☆329Updated last year
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆127Updated 2 years ago
- Tool to dump UEFI runtime drivers implementing runtime services for Windows☆106Updated 4 years ago
- Advanced driver monitoring utility.☆215Updated 3 years ago
- Compact MBR Bootkit for Windows☆54Updated 3 years ago
- a minimalistic windows hypervisor for amd processors☆123Updated 3 years ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆142Updated 4 years ago
- alternative smm driver for ryzen motherboards☆156Updated 10 months ago
- SMM driver/rootkit for platform memory access with R3 <-> R0 <-> R-2 communication.☆91Updated 10 months ago
- A simple Windows kernel rootkit.☆92Updated 3 months ago
- A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)☆80Updated last year
- Kernel driver for detecting Intel VT-x hypervisors.☆189Updated 2 years ago
- ☆37Updated 3 years ago
- Detects virtual machines and malware analysis environments☆135Updated 2 years ago
- Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling withou…☆219Updated 9 months ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆206Updated 4 years ago
- uefi diskless persistence technique + OVMF secureboot bypass☆86Updated last year
- Code Injection, Inject malicious payload via pagetables pml4.☆242Updated 4 years ago
- bypassing intel txt's tboot integrity checks via coreboot shim☆78Updated 5 months ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆252Updated 2 years ago
- ☆153Updated 5 years ago
- Tool to dump EFI runtime drivers.☆36Updated last year
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆297Updated 10 months ago
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆156Updated 5 months ago
- memory introspection and reverse engineering hypervisor powered by leveraging Hyper-V☆290Updated 3 weeks ago