tandasat / kraft_dinnerView external linksLinks
Tool to dump UEFI runtime drivers implementing runtime services for Windows
☆111Dec 24, 2020Updated 5 years ago
Alternatives and similar repositories for kraft_dinner
Users that are interested in kraft_dinner are comparing it to the libraries listed below
Sorting:
- This is an instruction to run your own SMM code.☆109Mar 8, 2021Updated 4 years ago
- ☆15Oct 7, 2020Updated 5 years ago
- The runtime DXE driver monitoring access to the UEFI variables by hooking the runtime service table.☆146Oct 9, 2020Updated 5 years ago
- An x64 page table iterator written in C++ as a kernel mode windows driver.☆119May 25, 2021Updated 4 years ago
- Disks for DMA☆141Apr 28, 2021Updated 4 years ago
- UEFI bootkit for driver manual mapping☆583Jan 1, 2024Updated 2 years ago
- A simple example how to decrypt kernel debugger data block☆31Feb 8, 2021Updated 5 years ago
- Intercepting DeviceControl via WPP☆138Nov 18, 2019Updated 6 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- A native hypervisor designed for the Windows operating system☆125Mar 6, 2021Updated 4 years ago
- A research project about Windows notify routines.☆38Jul 31, 2020Updated 5 years ago
- Communication via callback☆73Oct 9, 2019Updated 6 years ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆144Mar 29, 2021Updated 4 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆89Mar 16, 2021Updated 4 years ago
- Windows system spy for Mouse, Keyboard and Gamepad(Joystick).☆15Jul 6, 2022Updated 3 years ago
- A working version of this tutorial: https://docs.microsoft.com/en-us/windows/desktop/rpc/tutorial☆16Jun 22, 2019Updated 6 years ago
- ☆29Jan 15, 2021Updated 5 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆36Jun 25, 2019Updated 6 years ago
- System Management RAM analysis tool☆84Aug 9, 2024Updated last year
- PoC HWID spoofer that runs in EFI☆341Dec 26, 2024Updated last year
- Undocumented NsiAllocateAndGetTable usage in GetTcpTableInternal reverse engineered on Win7 X64☆20Apr 7, 2018Updated 7 years ago
- Easy Anti PatchGuard☆223Apr 9, 2021Updated 4 years ago
- Efi Driver Access is a simply project to load a driver during system boot with the idea to give the user kernel access for read/write mem…☆473Jan 8, 2023Updated 3 years ago
- ☆109Nov 13, 2023Updated 2 years ago
- alternative smm driver for ryzen motherboards☆188Oct 12, 2024Updated last year
- BattlEye compatible injector, done completely from user-mode, project by secret.club☆251Oct 25, 2020Updated 5 years ago
- HelloAmdHvPkg is a type-1 research hypervisor for AMD processors.☆106Jun 28, 2020Updated 5 years ago
- A simple x86_64 AMD-v hypervisor type-2 Programmed with C++, with soon to be added syscall hooks. [W.I.P]☆103Aug 3, 2023Updated 2 years ago
- Reverse engineered source code of the autochk rootkit☆208Nov 1, 2019Updated 6 years ago
- Basic utilities for executing, reading and writing 64-bit data in a 32-bit WoW64 process☆19Jul 8, 2022Updated 3 years ago
- init☆14Mar 16, 2020Updated 5 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104May 14, 2020Updated 5 years ago
- manually map driver for a signed driver memory space☆174Mar 11, 2021Updated 4 years ago
- Hide SMBIOS/disk/NIC serials from EFI bootkit☆323May 14, 2021Updated 4 years ago
- A project for allowing EDK-II Development with Visual Studio☆586Oct 30, 2022Updated 3 years ago
- Cheat for my own game SecureGame which uses a bootkit to hyperjack Hyper-V in order to access VBS enclave's memory☆103Dec 8, 2024Updated last year
- Hooking kernel functions by abusing alignment☆248Jan 5, 2021Updated 5 years ago
- The Universal C++ RunTime library, supporting kernel-mode C++ exception-handler and STL.☆407Jul 12, 2024Updated last year
- ☆68Dec 17, 2020Updated 5 years ago