pRain1337 / HermesLinks
SMM UEFI module and client for UMD privilege escalation
☆60Updated 4 months ago
Alternatives and similar repositories for Hermes
Users that are interested in Hermes are comparing it to the libraries listed below
Sorting:
- Another UEFI runtime bootkit☆31Updated 2 years ago
- SMM rootkit similar to LoJax or MosaicRegressor☆139Updated last year
- Tool to dump EFI runtime drivers.☆37Updated last year
- uefi diskless persistence technique + OVMF secureboot bypass☆94Updated last year
- SMM driver/rootkit for platform memory access with R3 <-> R0 <-> R-2 communication.☆92Updated last year
- Using MMIO (Memory-Mapped I/O) to read TPM 2.0 public Endorsement Key.☆49Updated last year
- bypassing intel txt's tboot integrity checks via coreboot shim☆83Updated 7 months ago
- EFI bootkit for loading unsigned drivers☆19Updated last year
- Runtime Hyper-V Hijacking with DDMA☆63Updated 2 months ago
- Using Windows' own bootloader as a shim to bypass Secure Boot☆190Updated last year
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆58Updated last year
- ☆251Updated last month
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆167Updated last month
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆129Updated 2 years ago
- ☆37Updated 3 years ago
- Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling withou…☆236Updated 11 months ago
- alternative smm driver for ryzen motherboards☆173Updated last year
- Hooking Windows' exception dispatcher to protect process's PML4☆203Updated 9 months ago
- Simple anti-instrumentation with EFLAGS.AC☆18Updated 6 months ago
- Rewrite and obfuscate code in compiled binaries☆259Updated last week
- NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (eithe…☆228Updated 2 weeks ago
- Provides commands to read from and write to arbitrary kernel-mode memory for users with the Administrator privilege. HVCI compatible. No …☆21Updated last year
- Windows 11 24H2 Runtime PatchGuard Bypass☆199Updated last week
- Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board☆95Updated 2 years ago
- intel vt-x type 2 hypervisor☆59Updated 6 months ago
- a minimalistic windows hypervisor for amd processors☆126Updated 3 years ago
- A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)☆95Updated 2 years ago
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆96Updated 4 months ago
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆156Updated last year
- Find out how to bypass HVCI (or not). My own research on Microsoft Warbird (specifically in clipsp.sys)☆47Updated last week