pRain1337 / Hermes
SMM UEFI module and client for UMD privilege escalation
☆32Updated last year
Alternatives and similar repositories for Hermes:
Users that are interested in Hermes are comparing it to the libraries listed below
- Report and exploit of CVE-2023-36427☆89Updated last year
- Another UEFI runtime bootkit☆29Updated last year
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆68Updated 3 months ago
- Report and exploit of CVE-2024-21305.☆34Updated last year
- Windows KASLR bypass using prefetch side-channel☆76Updated 9 months ago
- Exploit POC for CVE-2024-36877☆46Updated 6 months ago
- Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board☆73Updated last year
- Tool to dump EFI runtime drivers.☆35Updated 11 months ago
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆26Updated 2 years ago
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆147Updated this week
- UEFI bootkit: Hardware Implant. In-Progress☆13Updated 2 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- A journal for $6,000 Riot Vanguard bounty.☆61Updated last year
- Finding Truth in the Shadows☆88Updated 2 years ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆52Updated 2 years ago
- This repo contains EXPs about Vulnerable Windows Driver☆32Updated 8 months ago
- Compact MBR Bootkit for Windows☆45Updated 3 years ago
- Abusing exceptions for code execution.☆109Updated 2 years ago
- SMM driver/rootkit for platform memory access with R3 <-> R0 <-> R-2 communication.☆81Updated 4 months ago
- A dynamically loadable virtual-machine based rootkit designed for Linux Kernel v5.13.0 using AMD-V (SVM).☆29Updated 2 years ago
- Unicorn Engine port for UEFI firmware☆46Updated 2 months ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆173Updated last year
- ☆34Updated 2 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆70Updated last year
- SMM rootkit similar to LoJax or MosaicRegressor☆107Updated last year
- A native Windows library for intercepting kernel-to-user transitions using instrumentation callbacks☆17Updated last year
- HackSysExtremeVulnerableDriver exploits for latest Windows 10 version☆22Updated 2 years ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆113Updated last year
- Using Windows' own bootloader as a shim to bypass Secure Boot☆158Updated 7 months ago
- Contains all the applications developed for the Second part of the 7th Edition of Windows Internals book☆105Updated 7 months ago