xsh3llsh0ck / Calamity
Example of using Windows Platform Binary Table (WPBT)
☆20Updated last year
Alternatives and similar repositories for Calamity:
Users that are interested in Calamity are comparing it to the libraries listed below
- Another UEFI runtime bootkit☆29Updated last year
- This is a POC Test project for INTEL CPUs on blocking NMI Entries through the IDT Handler.☆44Updated 6 months ago
- C/C++ antidebugging library for Windows☆18Updated 3 months ago
- CMake template for a basic EFI application/bootkit. This library is header-only, there is no EDK2 runtime!).☆76Updated 2 years ago
- Me fockin' pe protector☆45Updated 2 years ago
- A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)☆59Updated last year
- Cheat for my own game SecureGame which uses a bootkit to hyperjack Hyper-V in order to access VBS enclave's memory☆53Updated 4 months ago
- intel vt-x type 2 hypervisor☆51Updated last week
- Using MMIO (Memory-Mapped I/O) to read TPM 2.0 public Endorsement Key.☆40Updated 10 months ago
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆37Updated 6 months ago
- Tool to dump EFI runtime drivers.☆35Updated last year
- Windows PDB parser for kernel-mode environment.☆95Updated 2 years ago
- EFI bootkit for loading unsigned drivers☆17Updated 9 months ago
- Binary rewriter for 64-bit PE files.☆70Updated last year
- x64 Windows implementation of virtual-address to physical-address translation☆40Updated 3 years ago
- just proof of concept. hooking MmCopyMemory PG safe.☆67Updated last year
- Win64 UEFI Driver-based tool for unrestricted memory R/W☆26Updated 3 years ago
- SMM driver/rootkit for platform memory access with R3 <-> R0 <-> R-2 communication.☆85Updated 6 months ago
- Experiment with PAGE_GUARD protection to hide memory from other processes☆44Updated 10 months ago
- ☆22Updated last year
- A poc that abuses Enclave☆38Updated 2 years ago
- partially disable patchguard up to win11 21H2☆19Updated 10 months ago
- Simple and lightweight hypervisor for AMD processors☆29Updated 4 months ago
- The sequel to Voyager☆47Updated 8 months ago
- PAGE_GUARD based hooking library☆43Updated 2 years ago
- Collection of Cheat dumps for Research and Detection.☆13Updated last week
- x86-64 user mode emulation using Zydis☆46Updated 3 months ago
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆52Updated 3 years ago
- Small driver that uses alternative syscalls feature (the project is still under development).☆15Updated 11 months ago
- ntoskrnl .data hooks for UM-KM communication☆40Updated 11 months ago