This document outlines the design and implementation of malicious processors (IMPs) capable of enabling software-based attacks. It discusses two general hardware mechanisms - a memory access mechanism and a shadow mode mechanism. The memory access mechanism allows unprivileged software to access privileged memory regions, enabling attacks like privilege escalation. The shadow mode mechanism allows executing malicious code in a hidden mode. The document evaluates the circuit-level impacts and performance overhead of implementing these mechanisms on a Leon3 processor and discusses potential defending strategies and their limitations.