pRain1337 / HermesLinks
SMM UEFI module and client for UMD privilege escalation
☆65Updated 8 months ago
Alternatives and similar repositories for Hermes
Users that are interested in Hermes are comparing it to the libraries listed below
Sorting:
- Another UEFI runtime bootkit☆35Updated 2 years ago
- SMM driver/rootkit for platform memory access with R3 <-> R0 <-> R-2 communication.☆115Updated last year
- Tool to dump EFI runtime drivers.☆39Updated last year
- bypassing intel txt's tboot integrity checks via coreboot shim☆82Updated 10 months ago
- SMM rootkit similar to LoJax or MosaicRegressor☆145Updated 2 years ago
- EFI bootkit for loading unsigned drivers☆21Updated last year
- uefi diskless persistence technique + OVMF secureboot bypass☆95Updated last year
- Using MMIO (Memory-Mapped I/O) to read TPM 2.0 public Endorsement Key.☆52Updated last year
- Hooking Windows' exception dispatcher to protect process's PML4☆223Updated last year
- Hijacking Hyper-V at Runtime with DDMA☆76Updated 5 months ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆132Updated 2 years ago
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆60Updated last year
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆169Updated 5 months ago
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆117Updated this week
- NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (eithe…☆243Updated 3 months ago
- alternative smm driver for ryzen motherboards☆186Updated last year
- Provides commands to read from and write to arbitrary kernel-mode memory for users with the Administrator privilege. HVCI compatible. No …☆23Updated last year
- Simple anti-instrumentation with EFLAGS.AC☆17Updated 10 months ago
- ☆262Updated 5 months ago
- Kernel driver for detecting Intel VT-x hypervisors.☆192Updated 2 years ago
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆137Updated last year
- Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling withou…☆251Updated last year
- Find out how to bypass HVCI (or not). My own research on Microsoft Warbird (specifically in clipsp.sys)☆86Updated 3 months ago
- DSE & PG bypass via BYOVD attack☆77Updated 6 months ago
- Rewrite and obfuscate code in compiled binaries☆273Updated last month
- compile-time control flow obfuscation using mba☆199Updated 2 years ago
- intel vt-x type 2 hypervisor☆61Updated 9 months ago
- Using Windows' own bootloader as a shim to bypass Secure Boot☆214Updated last year
- Yet another IDA Pro/Home plugin for deobfuscating stack strings☆117Updated last week
- Collection of hypervisor detections☆293Updated last year