ENNAENNA

PCILeech

AGPL-3.0

🧬 Reverse Engineering · C

PCILeech uses PCIe/Thunderbolt/USB3380 hardware to perform Direct Memory Access (DMA) attacks against target computers. It can read and write physical memory of live systems without requiring any software on the target. Capabilities include dumping full physical memory, patching kernel code in-memory (e.g., removing authentication), injecting code into running processes, and extracting encryption keys. PCILeech supports FPGA-based hardware (Screamer, PCIe squirrel) for high-speed transfers and includes plugins for common attack scenarios like Windows login bypass, BitLocker key extraction, and macOS FileVault attacks. A powerful tool for physical security assessments.

7.6kstars
995forks
8issues
Updated 12d ago
+I use this

Installation

$ git clone https://github.com/ufrisk/pcileech.git

Use Cases

  • Physical memory acquisition from live systems
  • Bypassing full-disk encryption via DMA
  • Kernel-level code patching without target software
  • Physical security assessment of DMA protections

Tags

dma-attackmemory-forensicshardwarepciephysical-access

Community Reviews

More in Reverse Engineering