xsh3llsh0ck / CalamityLinks
Example of using Windows Platform Binary Table (WPBT)
☆26Updated 2 years ago
Alternatives and similar repositories for Calamity
Users that are interested in Calamity are comparing it to the libraries listed below
Sorting:
- Another UEFI runtime bootkit☆32Updated 2 years ago
- CMake template for a basic EFI application/bootkit. This library is header-only, there is no EDK2 runtime!).☆78Updated 3 years ago
- Runtime Hyper-V Hijacking with DDMA☆64Updated 3 months ago
- Binary rewriter for 64-bit PE files.☆88Updated last year
- x86-64 user mode emulation using Zydis☆69Updated 2 months ago
- Yet another IDA Pro/Home plugin for deobfuscating stack strings☆104Updated last month
- intel vt-x type 2 hypervisor☆60Updated 7 months ago
- Simple and lightweight hypervisor for AMD processors☆41Updated 3 weeks ago
- Visual Studio Project example for using Microsoft's STL in WDM (Windows Kernel-mode Driver)☆25Updated 4 years ago
- Windows PDB parser for kernel-mode environment.☆101Updated 5 months ago
- Windows kernel driver template for cmkr (with testsigning).☆36Updated 2 years ago
- Me fockin' pe protector☆45Updated 3 years ago
- Small driver that uses alternative syscalls feature (the project is still under development).☆18Updated last year
- reverse engineering of the windows nt kernel debugger protocol & reimplementation.☆29Updated last year
- Win64 UEFI Driver-based tool for unrestricted memory R/W☆29Updated 3 years ago
- Collection of Cheat dumps for Research and Detection.☆16Updated 3 months ago
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆45Updated last year
- Using MMIO (Memory-Mapped I/O) to read TPM 2.0 public Endorsement Key.☆49Updated last year
- ☆29Updated last year
- A poc that abuses Enclave☆40Updated 3 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆67Updated 2 years ago
- A Windows PE packer for executables (x64) with LZMA compression and with full TLS (Thread Local Storage) support.☆90Updated 3 weeks ago
- SMM driver/rootkit for platform memory access with R3 <-> R0 <-> R-2 communication.☆105Updated last year
- Simple anti-instrumentation with EFLAGS.AC☆18Updated 7 months ago
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆59Updated last year
- A demonstration of hooking into the VMProtect-2 virtual machine☆22Updated 2 years ago
- vdk is a set of utilities used to help with exploitation of a vulnerable driver.☆42Updated 3 years ago
- A x86_64 software emulator☆156Updated 2 months ago
- Disk based DMA for ATA and SCSI☆35Updated 2 years ago
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆51Updated 3 years ago