This is an instruction to run your own SMM code.
☆108Mar 8, 2021Updated 4 years ago
Alternatives and similar repositories for HelloSmm
Users that are interested in HelloSmm are comparing it to the libraries listed below
Sorting:
- Tool to dump UEFI runtime drivers implementing runtime services for Windows☆111Dec 24, 2020Updated 5 years ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆145Mar 29, 2021Updated 4 years ago
- The sample DXE runtime driver demonstrating how to program DMA remapping.☆73Dec 27, 2023Updated 2 years ago
- The runtime DXE driver monitoring access to the UEFI variables by hooking the runtime service table.☆146Oct 9, 2020Updated 5 years ago
- Simple Demo of using Windows Hypervisor Platform☆29Jul 14, 2025Updated 7 months ago
- SMM rootkit similar to LoJax or MosaicRegressor☆146Nov 1, 2023Updated 2 years ago
- ☆39Oct 29, 2020Updated 5 years ago
- C++ Exceptions in Windows Drivers☆221Dec 21, 2020Updated 5 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆23Sep 18, 2017Updated 8 years ago
- A native hypervisor designed for the Windows operating system☆125Mar 6, 2021Updated 4 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104May 14, 2020Updated 5 years ago
- a demo for x86/x64's paging memory management learning, convert a virtual address from ring3 to physical address in ring0☆19Aug 26, 2017Updated 8 years ago
- ☆68Dec 17, 2020Updated 5 years ago
- pdb's function and global vars to offset☆10Apr 11, 2023Updated 2 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆109Apr 24, 2020Updated 5 years ago
- File system minifilter driver for Windows to block symbolic link attacks.☆51Dec 16, 2020Updated 5 years ago
- first commit☆64Oct 29, 2020Updated 5 years ago
- UEFI bootkit for driver manual mapping☆586Jan 1, 2024Updated 2 years ago
- Elevation of privilege detector based on HyperPlatform☆123Mar 5, 2017Updated 9 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆53Sep 12, 2019Updated 6 years ago
- A virtualization-based endpoint security solution for Windows☆88May 23, 2021Updated 4 years ago
- System Management RAM analysis tool