valinet / ssdeLinks
SSDE is a collection of utilities that help in having Windows load your custom signed kernel drivers when Secure Boot is on and you own the system's platform key, instead of using test mode.
☆227Updated 4 years ago
Alternatives and similar repositories for ssde
Users that are interested in ssde are comparing it to the libraries listed below
Sorting:
- Simple EFI runtime driver that hooks GetVariable function and returns data expected by Windows to make it think that it's running with se…☆200Updated 4 years ago
- advanced solana trading bot on pumpfun. top solana sniper trading bot enhanced solana copy trading bot gRPC shrdstream frontrunning front…☆442Updated last week
- This tiny project prevents the signtool from verifing cert time validity and let you sign your bin with outdated cert without changing sy…☆236Updated 6 years ago
- Load self-signed drivers without TestSigning or disable DSE. Transferred from https://github.com/DoubleLabyrinth/Windows10-CustomKernelSi…☆759Updated 5 years ago
- Guide for patching AMI Aptio V UEFI firmware to circumvent Secure Boot checks☆121Updated last year
- A multiline (and ultimate) assembler (and disassembler) plugin for x64dbg and OllyDbg. A perfect tool for modifying and extending a compi…☆153Updated 8 months ago
- Unsigned driver loader using CVE-2018-19320☆305Updated 2 years ago
- Windows inline hooking tool.☆288Updated 6 years ago
- Hide SMBIOS/disk/NIC serials from EFI bootkit☆307Updated 4 years ago
- KDP compatible unsigned driver loader leveraging a write primitive in one of the IOCTLs of gdrv.sys☆157Updated last year
- Kernel-Mode extended version of https://github.com/microsoft/Detours☆174Updated 4 months ago
- A PoC for vulnerable driver "mhyprot" that allows us to read/write memory in kernel/user from usermode.☆162Updated 4 years ago
- https://www.codeproject.com/Articles/5348168/Disable-Driver-Signature-Enforcement-with-DSE-Patc☆20Updated 2 years ago
- THIS PROJECT IS DISCONTINUED! WMISpoofer allows you to spoof information which other applications read from the Windows Management Instru…☆59Updated 8 years ago
- Universal x86/x64 VMProtect 2.0-3.X Import fixer☆11Updated 3 years ago
- Try to hide Sndboxie☆92Updated 2 months ago
- Windows Filtering Platform Explorer☆295Updated last month
- Collection of undocumented Windows API declarations.☆326Updated last month
- QEMU patched to avoid detection from various anticheats such as Battleye/EAC☆82Updated last year
- 🧪 Hypervisor with EPT hooking support.☆262Updated this week
- A plugin to x64dbg that lets you find out what writes to/accesses particular address☆115Updated 4 years ago
- The most powerful and customizable binary pattern scanner☆242Updated 3 years ago
- PE Viewer☆194Updated last month
- Ghetto user mode emulation of Windows kernel drivers.☆146Updated 11 months ago
- DSE bypass using a leaked cert and adjusting the current clock.☆152Updated 3 years ago
- MouHidInputHook enables users to filter, modify, and inject mouse input data packets into the input data stream of HID USB mouse devices …☆280Updated 5 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆357Updated 3 years ago
- alternative smm driver for ryzen motherboards☆171Updated 11 months ago
- PoC HWID spoofer that runs in EFI☆319Updated 9 months ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆352Updated 3 years ago