pRain1337 / Hermes
SMM UEFI module and client for UMD privilege escalation
☆30Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Hermes
- Another UEFI runtime bootkit☆30Updated last year
- Tool to dump EFI runtime drivers.☆34Updated 9 months ago
- Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board☆65Updated last year
- A attempt at replicating BLACKLOTUS capabilities, whilst not acting as a direct mimic.☆85Updated last year
- Report and exploit of CVE-2023-36427☆87Updated last year
- SMM rootkit similar to LoJax or MosaicRegressor☆102Updated last year
- A thin introspection hypervisor framework that allows for low level resource manipulation.☆12Updated 9 months ago
- SMM driver/rootkit for platform memory access with R3 <-> R0 <-> R-2 communication.☆67Updated last month
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆106Updated last year
- Report and exploit of CVE-2024-21305.☆30Updated 10 months ago
- Exploit POC for CVE-2024-36877☆44Updated 3 months ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆53Updated 3 years ago
- Unicorn Engine port for UEFI firmware☆44Updated 6 months ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆49Updated last year
- DSE & PG bypass via BYOVD attack☆37Updated 7 months ago
- Take back control of Windows Code Integrity, no exploits or patching required! Requires that you control your own Platform Key (PK).☆37Updated 2 years ago
- Compact MBR Bootkit for Windows☆44Updated 2 years ago
- UEFI bootkit: Hardware Implant. In-Progress☆11Updated 2 years ago
- Win64 UEFI Driver-based tool for unrestricted memory R/W☆26Updated 2 years ago
- A UEFI extraction tool☆11Updated 3 weeks ago
- Research on obfuscated licensing APIs / CLIP service in the Windows kernel☆86Updated 2 years ago
- An x64dbg plugin which helps make sense of long C++ symbols☆59Updated last year
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆28Updated 2 years ago
- ☆60Updated 6 months ago
- Information about a signed UEFI Shell that can be used when Secure Boot is enabled.☆76Updated 3 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆61Updated last year
- Different tools for Microsoft Hyper-V researching☆46Updated 5 months ago
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆58Updated 3 weeks ago
- ☆26Updated 2 years ago
- Me fockin' pe protector☆45Updated 2 years ago