liba2k / Insomni-Hack-2022Links
Breaking Secure Boot with SMM
☆41Updated 3 years ago
Alternatives and similar repositories for Insomni-Hack-2022
Users that are interested in Insomni-Hack-2022 are comparing it to the libraries listed below
Sorting:
- ☆41Updated 4 years ago
- A fast execution trace symbolizer for Windows.☆129Updated last year
- Helper idapython code for reversing kmdf drivers☆74Updated 3 years ago
- ☆85Updated 3 years ago
- A collection of my scripts for research☆12Updated 4 months ago
- Binary Ninja plugin that decompiles the whole binary and saves them in a directory.☆22Updated 3 years ago
- This utility allows you to lock every available memory regions of an arbitrary process into its working set.☆69Updated 2 years ago
- ☆50Updated 3 years ago
- ☆12Updated 3 years ago
- VMX intrinsics plugin for Hex-Rays decompiler☆72Updated 6 years ago
- Tools made for my Hyper-V blog series @ https://foxhex0ne.blogspot.com/☆57Updated 5 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆47Updated 6 years ago
- ☆49Updated 5 years ago
- ☆35Updated 3 years ago
- CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code☆37Updated 5 years ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆42Updated 4 years ago
- ☆41Updated 5 years ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆74Updated last year
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Updated 5 years ago
- ☆86Updated 2 years ago
- Ghidra analyzer for UEFI firmware.☆18Updated 2 years ago
- IDA (sort of) headless☆26Updated last year
- ☆24Updated 4 years ago
- Python interface for Binexport, the Bindiff export format☆19Updated this week
- PoC for CVE-2017-0075☆37Updated 6 years ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆143Updated 4 years ago
- Python bindings for BochsCPU☆37Updated 4 months ago
- ☆30Updated 5 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 3 years ago
- IDA SIG files for multiarch uClibc library☆38Updated 7 years ago