jussihi / SMM-RootkitLinks
SMM rootkit similar to LoJax or MosaicRegressor
☆120Updated last year
Alternatives and similar repositories for SMM-Rootkit
Users that are interested in SMM-Rootkit are comparing it to the libraries listed below
Sorting:
- SMM UEFI module and client for UMD privilege escalation☆46Updated last week
- A small bootkit which does not rely on x64 assembly.☆488Updated 5 years ago
- Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks☆319Updated last year
- MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x and EPT features. M…☆226Updated 4 years ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆140Updated 4 years ago
- A native hypervisor designed for the Windows operating system☆123Updated 4 years ago
- ☆206Updated this week
- ☆153Updated 5 years ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆144Updated 2 years ago
- Resolve DOS MZ executable symbols at runtime☆95Updated 3 years ago
- Load your driver like win32k.sys☆254Updated 2 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆245Updated 2 years ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆121Updated 2 years ago
- Bypassing PatchGuard on modern x64 systems☆260Updated 2 years ago
- The Windows Research Kernel (WRK)☆196Updated 8 years ago
- Reverse engineered source code of the autochk rootkit☆202Updated 5 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆238Updated 3 years ago
- The sample DXE runtime driver demonstrating how to program DMA remapping.☆58Updated last year
- Collection of hypervisor detections☆236Updated 8 months ago
- Kernel driver for detecting Intel VT-x hypervisors.☆184Updated last year
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆201Updated 4 years ago
- SMM driver/rootkit for platform memory access with R3 <-> R0 <-> R-2 communication.☆86Updated 7 months ago
- Rusty Hypervisor - Windows UEFI Blue Pill Type-1 Hypervisor in Rust (Codename: Illusion)☆263Updated 9 months ago
- Using Windows' own bootloader as a shim to bypass Secure Boot☆170Updated 10 months ago
- Hooking Windows' exception dispatcher to protect process's PML4☆174Updated 4 months ago
- Tool to dump UEFI runtime drivers implementing runtime services for Windows☆97Updated 4 years ago
- Exploit MsIo vulnerable driver☆104Updated 3 years ago
- Compact MBR Bootkit for Windows☆53Updated 3 years ago
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆59Updated 5 years ago
- x86 PE Mutator☆219Updated 2 years ago