jussihi / SMM-Rootkit
SMM rootkit similar to LoJax or MosaicRegressor
☆108Updated last year
Alternatives and similar repositories for SMM-Rootkit:
Users that are interested in SMM-Rootkit are comparing it to the libraries listed below
- SMM UEFI module and client for UMD privilege escalation☆33Updated last year
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆136Updated 3 years ago
- Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks☆304Updated last year
- Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board☆73Updated last year
- The sample DXE runtime driver demonstrating how to program DMA remapping.☆58Updated last year
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆141Updated 2 years ago
- Compact MBR Bootkit for Windows☆45Updated 3 years ago
- 2022 Updated Kernelmode-Code☆30Updated 11 months ago
- The runtime DXE driver monitoring access to the UEFI variables by hooking the runtime service table.☆138Updated 4 years ago
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆81Updated 4 years ago
- MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x and EPT features. M…☆222Updated 4 years ago
- ☆92Updated 8 months ago
- A small bootkit which does not rely on x64 assembly.☆473Updated 5 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 3 years ago
- LOJAX ROOTKIT (UEFI) +PDF Included[x]☆29Updated 2 years ago
- ☆158Updated 3 years ago
- 👓A collection of papers/tools/exploits for UEFI security.☆155Updated last month
- Reverse engineered source code of the autochk rootkit☆201Updated 5 years ago
- A simple Windows kernel rootkit.☆90Updated last year
- A native hypervisor designed for the Windows operating system☆122Updated 4 years ago
- Abusing exceptions for code execution.☆109Updated 2 years ago
- NINA: No Injection, No Allocation x64 Process Injection Technique☆195Updated 4 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆209Updated 5 years ago
- Information about a signed UEFI Shell that can be used when Secure Boot is enabled.☆79Updated 3 years ago
- A simple hypervisor demonstrating the use of the Intel VT-rp (redirect protection) technology.☆101Updated 11 months ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆220Updated last year
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆55Updated 3 years ago
- Advanced driver monitoring utility.☆206Updated 2 years ago
- Another UEFI runtime bootkit☆29Updated last year
- uefi diskless persistence technique + OVMF secureboot bypass☆56Updated 10 months ago