bypassing intel txt's tboot integrity checks via coreboot shim
☆83Mar 15, 2025Updated 11 months ago
Alternatives and similar repositories for checkm8
Users that are interested in checkm8 are comparing it to the libraries listed below
Sorting:
- I/O Cache-As-Ram + AMD x86_64 cache line locking | Mirror of https://codeberg.org/3itch/icekit☆18Mar 10, 2025Updated 11 months ago
- Simple anti-instrumentation with EFLAGS.AC☆17Mar 31, 2025Updated 11 months ago
- ☆53Mar 26, 2025Updated 11 months ago
- A debugger for Windows ARM64 (AARCH64), user-friendly for reverse engineers, malware analysts, malware developers, game hacking, operatin…☆72May 6, 2025Updated 9 months ago
- ☆90Feb 12, 2025Updated last year
- Hooking Windows' exception dispatcher to protect process's PML4☆228Jan 24, 2025Updated last year
- Using Windows' own bootloader as a shim to bypass Secure Boot☆225Jul 17, 2024Updated last year
- C++11 RAII memory patcher and function hooking thing☆35Oct 5, 2016Updated 9 years ago
- An x86-64 Code Virtualizer☆304Sep 26, 2024Updated last year
- Reversed WintaPix Malware Source code | That targets countries in the Middle East and abuse KeServiceDescriptorTable(SSDT), persistence a…☆22Jul 6, 2024Updated last year
- ☆17May 2, 2024Updated last year
- ☆31Feb 28, 2025Updated last year
- A graphing library for Control Flow Graphs☆105Jun 19, 2025Updated 8 months ago
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆49Nov 10, 2024Updated last year
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆61Oct 19, 2024Updated last year
- SMM driver/rootkit for platform memory access with R3 <-> R0 <-> R-2 communication.☆119Oct 15, 2024Updated last year
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆73Apr 13, 2025Updated 10 months ago
- an obfuscator based on LLVM which can obfuscate the program execution trajectory☆107Mar 15, 2021Updated 4 years ago
- Hijacking Hyper-V at Runtime with DDMA☆76Aug 13, 2025Updated 6 months ago
- ☆54Jan 17, 2026Updated last month
- Original xbox kernel re-implementation☆45Feb 11, 2026Updated 2 weeks ago
- A basic implementation of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆78Mar 29, 2025Updated 11 months ago
- Virtual Trust Level (VTL 1) secure call tracing☆102Feb 12, 2026Updated 2 weeks ago
- Tracks cross references and allows fast viewing of pseudocode between references☆13Mar 10, 2025Updated 11 months ago
- Yet another LLVM-based obfuscator☆124Sep 3, 2024Updated last year
- ☆272Sep 2, 2025Updated 5 months ago
- llvm powered deobfuscation of a vm-based protection☆47Updated this week
- x86-64 Automated test data generator☆26Aug 18, 2025Updated 6 months ago
- A simple Nim stager (w/ fiber execution)☆20Jan 31, 2022Updated 4 years ago
- Using the peculiar behaviour of the VPGATHER instructions to determine if an address will fault before it is truly accessed. All done in …☆54Dec 30, 2025Updated 2 months ago
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆140Apr 12, 2024Updated last year
- A simple C++ driver base with KD data block☆11Jun 25, 2022Updated 3 years ago
- POC about how to detect windows kernel debug by pool tag.☆13Nov 29, 2023Updated 2 years ago
- RE for champions☆15Updated this week
- This master thesis project continuously collects and analyses Microsoft Windows kernel drivers using static and dynamic methods to help s…☆21Nov 4, 2024Updated last year
- IFL - Interactive Functions List (plugin for Binary Ninja)☆25Jul 9, 2024Updated last year
- ☆25Dec 3, 2024Updated last year
- A collection of Proof-of-Concept implementations of various anti-disassembly techniques for ARM32 and ARM64 architectures.☆77Apr 18, 2025Updated 10 months ago
- Kernel-mode Paravirtualization in Ring 2, LLVM based linker, and some other things!☆409Apr 19, 2025Updated 10 months ago