Giter Site home page Giter Site logo

wack0 / securebootpolicytools Goto Github PK

View Code? Open in Web Editor NEW
26.0 5.0 7.0 156 KB

Take back control of Windows Code Integrity, no exploits or patching required! Requires that you control your own Platform Key (PK).

License: The Unlicense

C 90.01% Makefile 0.27% C# 9.73%
boot code-integrity secure-boot windows platform-key secure-boot-policy

securebootpolicytools's Introduction

SecureBootPolicyTools

Tools for creating and using Secure Boot policies.

bootmgr prior to RS1 accepts Secure Boot policies signed by PK.

Thus, if you control PK, you control what Windows Code Integrity trusts. Sign your own Windows Boot Application; hypervisor; securekernel; driver (VTL0/VTL1); protected process; PPL.

Included tools

  • SecureBootPolicy: library and compiler for Secure Boot policies. Includes three example policies:
    • SecureBootPolicyDefault.xml reimplements as much as possible the default Secure Boot policy included in bootmgr starting from RS2.
    • SecureBootPolicyDefaultWithSigners.xml is the same as above that also reimplements the default signers trusted by CI for easy extensibility
    • SecureBootPolicyExample.xml adds a custom signer. Replace the TBS hash and enjoy your trusted binaries.
  • EfiInstallPolicy: EFI application to install a signed Secure Boot policy into UEFI non-volatile variables.
  • BootAppToEfi: Windows Boot Application that switches back to the EFI environment and calls EfiMain().

Note

I am not responsible for anything that may happen to your systems/VMs when using these tools; after all, you control the keys!

securebootpolicytools's People

Contributors

wack0 avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar

securebootpolicytools's Issues

where do ID_SIGNINGSCENARIO_* come from?

hi, I very appreciate your work. I'm developing a tool to convert sipolicy.p7b back to xml format. The file SecureBootPolicy/SecureBootPolicy/Constants.cs gives me a lot of information about mapping between raw value and signing scenario. But I'd like to ask, where do these ID_SIGNINGSCENARIO_* come from? How do you get that?

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.