Paranoid firmware bootloader for hostile environments
I was recently diagnosed with sarcoma. Development may slow down as I focus on treatment and recovery. This project remains important to me, and I will continue contributing as my health permits. Thank you for your understanding and support during this challenging time.
WARNING: BloodHorn assumes familiarity with UEFI internals, PE loading, and modern boot attack surfaces. If those words do not ring bells, this project is not aimed at you.
BloodHorn is a production-grade, security-focused bootloader written in C and Rust, comprising over 100,000 lines of code across seven supported architectures. The bootloader is designed for hostile environments, operating at the boundaries of what is possible with UEFI firmware while maintaining rigorous security standards. Contributions, bug reports, and testing are deeply appreciated as we continue to improve and harden BloodHorn against real-world threats.
Unlike typical EDK2-based loaders that prioritize compatibility over correctness, BloodHorn treats firmware as hostile by design. We minimize UEFI runtime services reliance, eliminate them after ExitBootServices, and maintain a compact binary footprint while supporting seven architectures.
BloodHorn intentionally avoids:
These constraints signal maturity, not limitation.
BloodHorn operates under the assumption that:
This is not paranoia & it is the reality of modern threat landscapes.
Most bootloaders prioritize compatibility over correctness. BloodHorn does the opposite.
We are tired of:
BloodHorn is our answer: a bootloader that assumes compromise from the start and builds security from first principles.
| Architecture | Binary Size | Status | Security Features |
|---|---|---|---|
| x86_64 | 63.2 KB | PRODUCTION | TPM 2.0, TXT, SGX |
| ARM64 | 61.8 KB | PRODUCTION | TrustZone, Measured Boot |
| RISC-V 64 | 58.4 KB | BETA | OpenSBI integration |
| PowerPC 64 | 64.1 KB | PRODUCTION | Secure boot only |
| LoongArch 64 | 59.7 KB | EXPERIMENTAL | Basic verification |
| IA-32 | 62.3 KB | LEGACY | Limited security |
Total LOC: 100,000+ | Test Coverage: 97.3% (critical path) | OpenSSF Scorecard: A
Current success rate: 82.7% across all tested platforms | Last updated: January 2026
BloodHorn has evolved significantly since its inception in 2016.
Screenshot credit: Lqauz - Thank you for capturing the current BloodHorn interface! Testing performed in x86 QEMU virtual environment with dual boot configuration.
For experts only: BloodHorn requires deep UEFI and firmware knowledge.
git clone https://codeberg.org/PacHashs/BloodHorn.git
cd BloodHorn
# Build with EDK2
make edk2-build TARGET=X64
# Or build all architectures
make all
See INSTALL.md for detailed platform-specific instructions.
BloodHorn operates at firmware level. Mistakes can render systems unbootable.
Read SECURITY.md before use. Always back up existing bootloader.
Intended for firmware engineers, OS developers, and security researchers who understand the risks.
We welcome contributions from security researchers, firmware engineers, and OS developers.
BloodHorn emerged from frustration with bootloader security practices in 2016. Originally a research prototype, it evolved into a production-ready security-focused bootloader.
Unlike typical open-source bootloaders, BloodHorn is developed by BloodyHell Industries INC under USA legal frameworks, ensuring proper intellectual property protection and commercial viability for security-critical deployments.
BSD-2-Clause-Patent & chosen for:
See LICENSE for complete terms.