BloodHorn Logo

BloodHorn

Paranoid firmware bootloader for hostile environments

Version 7.81.0 Version 7.80.0 BSD-2-Clause-Patent 100K+ Lines of Code OpenSSF Scorecard A 97.3% Test Coverage 7 Architectures Stable Status
LICENSE: BSD-2-Clause-Patent STATUS: STABLE
NOTE FROM MAINTAINER

I was recently diagnosed with sarcoma. Development may slow down as I focus on treatment and recovery. This project remains important to me, and I will continue contributing as my health permits. Thank you for your understanding and support during this challenging time.

1. Overview

WARNING: BloodHorn assumes familiarity with UEFI internals, PE loading, and modern boot attack surfaces. If those words do not ring bells, this project is not aimed at you.

BloodHorn is a production-grade, security-focused bootloader written in C and Rust, comprising over 100,000 lines of code across seven supported architectures. The bootloader is designed for hostile environments, operating at the boundaries of what is possible with UEFI firmware while maintaining rigorous security standards. Contributions, bug reports, and testing are deeply appreciated as we continue to improve and harden BloodHorn against real-world threats.


2. Recent Commits

[7.81.0] feat: improved BloodHorn bootloader with security and performance improvements 2 days ago
[7.80.0] Enhance boot manager protocols and build configuration 5 days ago
[7.79.x] feat: updated the coreboot payload to load from same sources and configs as used in the uefi menu 5 days ago
[7.79.x] Add comprehensive Boot Manager Protocol for multiboot management last week
[7.78.x] feat(arch): add PowerPC architecture support last week
[7.77.x] Add Rust shim subsystem and docs for safe UEFI integration 3 weeks ago
[7.76.x] Fixed AES and GCM encryption implementations 2 weeks ago
[7.75.x] added openssf badge and security scorecard integration 3 weeks ago

3. What Makes BloodHorn Different

Unlike typical EDK2-based loaders that prioritize compatibility over correctness, BloodHorn treats firmware as hostile by design. We minimize UEFI runtime services reliance, eliminate them after ExitBootServices, and maintain a compact binary footprint while supporting seven architectures.

3.1 Design Philosophy

Security Through Minimalism

Auditable Codebase

Hostile Firmware Assumptions

Non-Goals

BloodHorn intentionally avoids:

These constraints signal maturity, not limitation.


4. Threat Model

BloodHorn operates under the assumption that:

This is not paranoia & it is the reality of modern threat landscapes.

Most bootloaders prioritize compatibility over correctness. BloodHorn does the opposite.

We are tired of:

BloodHorn is our answer: a bootloader that assumes compromise from the start and builds security from first principles.


5. Architecture Support

Architecture Binary Size Status Security Features
x86_64 63.2 KB PRODUCTION TPM 2.0, TXT, SGX
ARM64 61.8 KB PRODUCTION TrustZone, Measured Boot
RISC-V 64 58.4 KB BETA OpenSBI integration
PowerPC 64 64.1 KB PRODUCTION Secure boot only
LoongArch 64 59.7 KB EXPERIMENTAL Basic verification
IA-32 62.3 KB LEGACY Limited security

Total LOC: 100,000+ | Test Coverage: 97.3% (critical path) | OpenSSF Scorecard: A

Real-World Testing

Current success rate: 82.7% across all tested platforms | Last updated: January 2026


6. Visual Evidence

BloodHorn has evolved significantly since its inception in 2016.

2016 - Research Prototype
BloodHorn 2016 Screenshot
Original BloodHorn interface in QEMU
2026 - Production Ready
BloodHorn 2026 Screenshot
Current BloodHorn menu interface

Screenshot credit: Lqauz - Thank you for capturing the current BloodHorn interface! Testing performed in x86 QEMU virtual environment with dual boot configuration.


7. Getting Started

For experts only: BloodHorn requires deep UEFI and firmware knowledge.

Prerequisites

Build

git clone https://codeberg.org/PacHashs/BloodHorn.git
cd BloodHorn

# Build with EDK2
make edk2-build TARGET=X64

# Or build all architectures
make all

See INSTALL.md for detailed platform-specific instructions.

SAFETY NOTICE

BloodHorn operates at firmware level. Mistakes can render systems unbootable. Read SECURITY.md before use. Always back up existing bootloader. Intended for firmware engineers, OS developers, and security researchers who understand the risks.


8. Contributing

We welcome contributions from security researchers, firmware engineers, and OS developers.

Areas Needing Expertise

Project Origin

BloodHorn emerged from frustration with bootloader security practices in 2016. Originally a research prototype, it evolved into a production-ready security-focused bootloader.

Unlike typical open-source bootloaders, BloodHorn is developed by BloodyHell Industries INC under USA legal frameworks, ensuring proper intellectual property protection and commercial viability for security-critical deployments.


9. License

BSD-2-Clause-Patent & chosen for:

See LICENSE for complete terms.