xsh3llsh0ck / Calamity
Example of using Windows Platform Binary Table (WPBT)
☆20Updated last year
Alternatives and similar repositories for Calamity
Users that are interested in Calamity are comparing it to the libraries listed below
Sorting:
- Another UEFI runtime bootkit☆30Updated 2 years ago
- CMake template for a basic EFI application/bootkit. This library is header-only, there is no EDK2 runtime!).☆77Updated 2 years ago
- This is a POC Test project for INTEL CPUs on blocking NMI Entries through the IDT Handler.☆50Updated 7 months ago
- Binary rewriter for 64-bit PE files.☆74Updated last year
- EFI bootkit for loading unsigned drivers☆17Updated 10 months ago
- Me fockin' pe protector☆45Updated 2 years ago
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆37Updated 6 months ago
- intel vt-x type 2 hypervisor☆54Updated last month
- x86-64 user mode emulation using Zydis☆46Updated 4 months ago
- Port of zentool to Windows☆24Updated 2 months ago
- C/C++ antidebugging library for Windows☆21Updated 4 months ago
- Small driver that uses alternative syscalls feature (the project is still under development).☆15Updated last year
- devirtualization vmprotect☆62Updated 2 years ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆59Updated last year
- Collection of Cheat dumps for Research and Detection.☆13Updated this week
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆64Updated last year
- ZeroImport is a lightweight and easy to use C++ library for Windows Kernel Drivers. It allows you to hide any import in your kernel drive…☆48Updated 2 years ago
- Using MMIO (Memory-Mapped I/O) to read TPM 2.0 public Endorsement Key.☆40Updated 11 months ago
- just proof of concept. hooking MmCopyMemory PG safe.☆70Updated last year
- Windows kernel driver template for cmkr (with testsigning).☆33Updated last year
- x64 Windows implementation of virtual-address to physical-address translation☆42Updated 3 years ago
- Cheat for my own game SecureGame which uses a bootkit to hyperjack Hyper-V in order to access VBS enclave's memory☆55Updated 5 months ago
- Kernel ReClassEx☆62Updated last year
- Win64 UEFI Driver-based tool for unrestricted memory R/W☆26Updated 3 years ago
- windows rootkit☆59Updated last year
- Symbolic Execution based on lifting amd64 to z3☆26Updated 10 months ago
- Windows PDB parser for kernel-mode environment.☆97Updated 2 years ago
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆69Updated last year
- Driver shared section communication☆50Updated 2 months ago
- x86-64 Automated test data generator☆22Updated 3 months ago