Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0day vulnerability in machines of many vendors
☆701May 13, 2022Updated 3 years ago
Alternatives and similar repositories for ThinkPwn
Users that are interested in ThinkPwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PC firmware exploitation tool and library☆260May 13, 2022Updated 3 years ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆76Oct 22, 2016Updated 9 years ago
- PEI stage backdoor for UEFI compatible firmware☆226May 1, 2021Updated 4 years ago
- First open source and publicly available System Management Mode backdoor for UEFI based platforms. Good as general purpose playground for…☆628Oct 9, 2023Updated 2 years ago
- Open source library that implements translator and tools for REIL (Reverse Engineering Intermediate Language)☆512May 1, 2021Updated 4 years ago
- an open source toolkit for PCI bus exploration☆72Dec 18, 2016Updated 9 years ago
- Platform Security Assessment Framework☆3,202Updated this week
- Intel Engine & Graphics Firmware Analysis Tool☆1,251Dec 22, 2025Updated 3 months ago
- CHIPSEC module that exploits UEFI boot script table vulnerability☆136Jan 25, 2016Updated 10 years ago
- Tools for working with Intel ME☆223Mar 17, 2017Updated 9 years ago
- System Management RAM analysis tool☆83Aug 9, 2024Updated last year
- Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS☆105Jan 25, 2021Updated 5 years ago
- LPE exploits for Secret Net and Secret Net Studio☆52Mar 1, 2016Updated 10 years ago
- Tools to help with Reverse Engineering UEFI-based firmware☆400Mar 24, 2016Updated 10 years ago
- ☆74Jul 13, 2022Updated 3 years ago
- Parse BIOS/Intel ME/UEFI firmware related structures: Volumes, FileSystems, Files, etc☆899Feb 27, 2026Updated 3 weeks ago
- JEFF file format tools☆27Dec 24, 2015Updated 10 years ago
- The DrK Attack - Proof of concept☆348Mar 13, 2022Updated 4 years ago
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)☆323May 9, 2016Updated 9 years ago
- Kernel rootkit, that lives inside the Windows registry values data☆504Oct 8, 2017Updated 8 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago
- Intel Management Engine JTAG Proof of Concept☆538Jun 12, 2020Updated 5 years ago
- Conference slides and White-papers☆360Jan 3, 2020Updated 6 years ago
- HORSEPILL rootkit PoC☆234Aug 5, 2016Updated 9 years ago
- Demos of various injection techniques found in malware☆791Feb 15, 2022Updated 4 years ago
- The first open source vulnerability scanner for firmwares☆197Jul 18, 2016Updated 9 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit☆82Mar 9, 2017Updated 9 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆172Dec 7, 2016Updated 9 years ago
- Intel Management Engine firmware loader plugin for IDA☆93Jul 27, 2017Updated 8 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆288May 24, 2016Updated 9 years ago
- ☆288Jun 14, 2016Updated 9 years ago
- Various PoCs☆502Jan 27, 2020Updated 6 years ago
- This repository contains Python 2.7 scripts for parsing MFS/MFSB partition and extracting contained files.☆34Dec 19, 2017Updated 8 years ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆145Mar 29, 2021Updated 4 years ago
- Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode☆355Oct 21, 2018Updated 7 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆974Dec 11, 2020Updated 5 years ago
- Implementation of the SMM rootkit "The Watcher"☆132Mar 16, 2022Updated 4 years ago
- Reverse engineering tool for automatic structure recovering and memory use analysis based on DynamoRIO and Capstone☆324Aug 12, 2019Updated 6 years ago