jussihi / SMM-Rootkit
SMM rootkit similar to LoJax or MosaicRegressor
☆112Updated last year
Alternatives and similar repositories for SMM-Rootkit:
Users that are interested in SMM-Rootkit are comparing it to the libraries listed below
- SMM UEFI module and client for UMD privilege escalation☆37Updated last year
- Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks☆308Updated last year
- ☆163Updated last week
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆137Updated 4 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆209Updated 5 years ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆142Updated 2 years ago
- A small bootkit which does not rely on x64 assembly.☆476Updated 5 years ago
- Exploit MsIo vulnerable driver☆95Updated 3 years ago
- Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board☆75Updated last year
- Collection of hypervisor detections☆229Updated 6 months ago
- A native hypervisor designed for the Windows operating system☆122Updated 4 years ago
- The sample DXE runtime driver demonstrating how to program DMA remapping.☆58Updated last year
- Compact MBR Bootkit for Windows☆45Updated 3 years ago
- Simple EFI runtime driver that hooks GetVariable function and returns data expected by Windows to make it think that it's running with se…☆160Updated 3 years ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆119Updated last year
- ☆142Updated last year
- Code Injection, Inject malicious payload via pagetables pml4.☆232Updated 3 years ago
- Using Windows' own bootloader as a shim to bypass Secure Boot☆168Updated 8 months ago
- Abusing exceptions for code execution.☆109Updated 2 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆244Updated 2 years ago
- Resolve DOS MZ executable symbols at runtime☆97Updated 3 years ago
- Hooking Windows' exception dispatcher to protect process's PML4☆158Updated 2 months ago
- bypassing intel txt's tboot integrity checks via coreboot shim☆64Updated 2 weeks ago
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆152Updated 3 weeks ago
- Another UEFI runtime bootkit☆29Updated last year
- ☆152Updated 5 years ago
- Advanced driver monitoring utility.☆207Updated 2 years ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆225Updated 2 years ago
- APC Internals Research Code☆162Updated 4 years ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆56Updated 3 years ago