pRain1337 / Hermes
SMM UEFI module and client for UMD privilege escalation
☆39Updated last year
Alternatives and similar repositories for Hermes:
Users that are interested in Hermes are comparing it to the libraries listed below
- Tool to dump EFI runtime drivers.☆35Updated last year
- Another UEFI runtime bootkit☆29Updated last year
- bypassing intel txt's tboot integrity checks via coreboot shim☆65Updated last month
- EFI bootkit for loading unsigned drivers☆17Updated 9 months ago
- SMM driver/rootkit for platform memory access with R3 <-> R0 <-> R-2 communication.☆85Updated 6 months ago
- Report and exploit of CVE-2024-21305.☆34Updated last year
- Report and exploit of CVE-2023-36427☆90Updated last year
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆73Updated 5 months ago
- ☆36Updated 3 years ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆53Updated 2 years ago
- Using MMIO (Memory-Mapped I/O) to read TPM 2.0 public Endorsement Key.☆39Updated 10 months ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆118Updated last year
- ☆179Updated 2 weeks ago
- Hooking Windows' exception dispatcher to protect process's PML4☆162Updated 2 months ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆56Updated 3 years ago
- Compact MBR Bootkit for Windows☆45Updated 3 years ago
- UEFI bootkit: Hardware Implant. In-Progress☆13Updated 3 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆63Updated last year
- Windows PDB parser for kernel-mode environment.☆95Updated 2 years ago
- Hyper-V related resources☆30Updated last year
- Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board☆78Updated last year
- This repo contains EXPs about Vulnerable Windows Driver☆39Updated 10 months ago
- Binary rewriter for 64-bit PE files.☆70Updated last year
- An extended proof-of-concept for the CVE-2021-21551 Dell ‘dbutil_2_3.sys’ Kernel Exploit☆24Updated 3 years ago
- Using Windows' own bootloader as a shim to bypass Secure Boot☆169Updated 9 months ago
- Collection of hypervisor detections☆230Updated 6 months ago
- Finding Truth in the Shadows☆89Updated 2 years ago
- Me fockin' pe protector☆45Updated 2 years ago
- Provides commands to read from and write to arbitrary kernel-mode memory for users with the Administrator privilege. HVCI compatible. No …☆16Updated 10 months ago
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆152Updated last month