tandasat / UefiVarMonitor
The runtime DXE driver monitoring access to the UEFI variables by hooking the runtime service table.
☆139Updated 4 years ago
Alternatives and similar repositories for UefiVarMonitor:
Users that are interested in UefiVarMonitor are comparing it to the libraries listed below
- This is an instruction to run your own SMM code.☆103Updated 4 years ago
- EFI DXE Emulator and Interactive Debugger☆88Updated 5 years ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆139Updated 4 years ago
- EFI DXE Emulator and Interactive Debugger☆85Updated 5 years ago
- Hyper-V scripts☆121Updated last year
- Hyper-V Research is trendy now☆163Updated last week
- The sample DXE runtime driver demonstrating how to program DMA remapping.☆58Updated last year
- (unofficial) Hyper-V® Development Kit☆217Updated last year
- System Management RAM analysis tool☆77Updated 8 months ago
- Hyper-V Research is trendy now☆178Updated last year
- ☆92Updated 10 months ago
- HelloAmdHvPkg is a type-1 research hypervisor for AMD processors.☆91Updated 4 years ago
- A very simple hypervisor for learning experience.☆137Updated 3 years ago
- A simple hypervisor demonstrating the use of the Intel VT-rp (redirect protection) technology.☆105Updated last year
- IDA plugin for extending UEFI reverse engineering capabilities☆59Updated 3 years ago
- VT-based PCI device monitor (SPI)☆151Updated 4 years ago
- Elevation of privilege detector based on HyperPlatform☆120Updated 8 years ago
- A native hypervisor designed for the Windows operating system☆123Updated 4 years ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆96Updated 7 years ago
- Tool to dump UEFI runtime drivers implementing runtime services for Windows☆96Updated 4 years ago
- ☆126Updated 7 months ago
- The history of Windows Internals via symbols.☆176Updated 3 years ago
- Hypervisor based tool for monitoring system register accesses.☆145Updated 6 years ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆66Updated 8 years ago
- Python bindings for the Microsoft Hypervisor Platform APIs.☆80Updated 5 years ago
- MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x and EPT features. M…☆225Updated 4 years ago
- This is a place to share my miscellaneous projects.☆112Updated 5 years ago
- Some scripts for IDA Pro to assist with reverse engineering EFI binaries☆75Updated 9 years ago
- A software driver that lets you log kernel-mode debug output into a file on Windows.☆104Updated 6 years ago
- Intel x86 bare metal hypervisor for researching snapshot fuzzing ideas.☆166Updated 4 years ago