jussihi / SMM-Rootkit
SMM rootkit similar to LoJax or MosaicRegressor
☆107Updated last year
Alternatives and similar repositories for SMM-Rootkit:
Users that are interested in SMM-Rootkit are comparing it to the libraries listed below
- SMM UEFI module and client for UMD privilege escalation☆32Updated last year
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆135Updated 3 years ago
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆147Updated this week
- Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks☆300Updated last year
- Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board☆73Updated last year
- The sample DXE runtime driver demonstrating how to program DMA remapping.☆58Updated last year
- ☆141Updated last year
- A small bootkit which does not rely on x64 assembly.☆469Updated 5 years ago
- Abusing exceptions for code execution.☆109Updated 2 years ago
- A native hypervisor designed for the Windows operating system☆120Updated 3 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆243Updated 2 years ago
- ☆92Updated 8 months ago
- ☆157Updated 3 years ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆224Updated 2 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆209Updated 5 years ago
- Compact MBR Bootkit for Windows☆45Updated 3 years ago
- Report and exploit of CVE-2023-36427☆89Updated last year
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆68Updated 3 months ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆135Updated 2 years ago
- Another UEFI runtime bootkit☆29Updated last year
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆173Updated last year
- LOJAX ROOTKIT (UEFI) +PDF Included[x]☆28Updated last year
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆72Updated 3 years ago
- A simple hypervisor demonstrating the use of the Intel VT-rp (redirect protection) technology.☆100Updated 10 months ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆90Updated 3 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆69Updated last year
- MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x and EPT features. M…☆221Updated 4 years ago
- Exploitable drivers, you know what I mean☆128Updated 10 months ago
- 2022 Updated Kernelmode-Code☆31Updated 10 months ago
- UEFI and SMM Assessment Tool☆181Updated 2 months ago