unkbyte / measured_boot_pocLinks
Leveraging TPM2 TCG Logs (Measured Boot) to Detect UEFI Drivers and Pre-Boot Applications
☆19Updated 5 months ago
Alternatives and similar repositories for measured_boot_poc
Users that are interested in measured_boot_poc are comparing it to the libraries listed below
Sorting:
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆68Updated 2 years ago
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆36Updated last year
- A set of LLVM and GCC based plugins that perform code obfuscation.☆128Updated 2 months ago
- Finding Truth in the Shadows☆116Updated 2 years ago
- A VMWare logger using built-in backdoor.☆30Updated 10 months ago
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆43Updated 9 months ago
- kASLR bypass technique on Intel CPUs.☆24Updated 3 months ago
- An improved version of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆71Updated 5 months ago
- Generate a PDB file given the old PDB file and an address mapping☆49Updated last month
- Example of building an application verifer DLL☆50Updated last year
- Detours implementation (x64/x86) which used only ntdll import☆90Updated last year
- An x64dbg plugin which helps make sense of long C++ symbols☆59Updated 2 years ago
- A native Windows library for intercepting kernel-to-user transitions using instrumentation callbacks☆23Updated last year
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆32Updated 2 years ago
- PDB Rewriting Rust Library☆25Updated last year
- Signature finder (from PE-bear)☆37Updated last week
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆67Updated 4 months ago
- Load dll with undocumented functions and debug symbols☆47Updated last year
- ☆11Updated 3 years ago
- x86-64 virtualizing obfuscator written in Rust☆78Updated last year
- Elevate arbitrary MSR writes to kernel execution.☆38Updated 2 years ago
- ☆24Updated 9 months ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆79Updated 2 months ago
- Minimalistic Windows Kernel Allocator.☆49Updated last year
- Rust implementation of lazy_importer☆57Updated 2 years ago
- Rust bindings for VMProtect.☆26Updated last year
- Intel 64/Windows low-level experiments☆60Updated last week
- windows rootkit☆61Updated last year
- Exploiting the KsecDD Windows driver through Server Silos☆73Updated 9 months ago
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆87Updated last month