liba2k / Insomni-Hack-2022View external linksLinks
Breaking Secure Boot with SMM
☆41Apr 5, 2022Updated 3 years ago
Alternatives and similar repositories for Insomni-Hack-2022
Users that are interested in Insomni-Hack-2022 are comparing it to the libraries listed below
Sorting:
- ☆24Aug 27, 2021Updated 4 years ago
- ☆96Jun 18, 2024Updated last year
- ☆13Jul 31, 2020Updated 5 years ago
- Binary Ninja MLIL to LLVM IR lifter☆15May 8, 2021Updated 4 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- ☆15Oct 7, 2020Updated 5 years ago
- Communication through a serial port or named pipe☆57Jul 19, 2023Updated 2 years ago
- A documentation of several Tigress obfuscation passes and an attempt to simplify Mixed Boolean-Arithmetic (MBA) expressions.☆23Dec 3, 2021Updated 4 years ago
- MBA-Blast is a tool for simplification of MBA expressions.☆70Aug 6, 2021Updated 4 years ago
- Based off of [tarekwiz / League-Unpacker]☆23Aug 26, 2023Updated 2 years ago
- ☆12Feb 8, 2021Updated 5 years ago
- driver manual mapper☆12Feb 22, 2020Updated 5 years ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Sep 16, 2022Updated 3 years ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆144Mar 29, 2021Updated 4 years ago
- BurpCrypto officially confirms the supported JS library (BurpCrypto官方确认支持的JS库).☆12Sep 21, 2021Updated 4 years ago
- an advanced level shifting neighbor☆11Dec 6, 2021Updated 4 years ago
- Classes in C++ for building applications☆14Feb 6, 2026Updated last week
- My work on Kismet's excellent spectools☆14Nov 7, 2024Updated last year
- Android Shared Object Injector☆34Jan 7, 2021Updated 5 years ago
- MacOS kernel memory leak (4 bytes)☆30Apr 14, 2020Updated 5 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆31Apr 10, 2021Updated 4 years ago
- Материалы к статье "Препарируем Hyper V"☆14Nov 5, 2014Updated 11 years ago
- ☆12Apr 13, 2017Updated 8 years ago
- ☆11Aug 8, 2022Updated 3 years ago
- A tool for SigOver, signal overshadowing attack on the LTE broadcast signals in physical domain.☆36May 6, 2022Updated 3 years ago
- ☆133Jan 25, 2026Updated 2 weeks ago
- The simple UEFI application to create a Windows Platform Binary Table (WPBT) from the UEFI shell.☆120Oct 12, 2021Updated 4 years ago
- VT Hook☆50Jul 2, 2024Updated last year
- Runtime smm module loader☆35Jan 12, 2023Updated 3 years ago
- ☆33Nov 13, 2020Updated 5 years ago
- A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.☆38Mar 16, 2022Updated 3 years ago
- ☆31Jan 12, 2022Updated 4 years ago
- ☆118Aug 7, 2022Updated 3 years ago
- ☆92Oct 24, 2022Updated 3 years ago
- Decode machine code into VEX IR and translate into LLVM IR☆28Jun 1, 2019Updated 6 years ago
- V8 Tutorial PLDI 2019☆78Jul 23, 2019Updated 6 years ago
- Progress of learning kernel development☆14Nov 20, 2022Updated 3 years ago
- CobaltStrike AggressorScripts for the lazy☆10Jul 22, 2022Updated 3 years ago
- ☆11Apr 7, 2022Updated 3 years ago