Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0day vulnerability in machines of many vendors
☆700May 13, 2022Updated 3 years ago
Alternatives and similar repositories for ThinkPwn
Users that are interested in ThinkPwn are comparing it to the libraries listed below
Sorting:
- PC firmware exploitation tool and library☆260May 13, 2022Updated 3 years ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆76Oct 22, 2016Updated 9 years ago
- PEI stage backdoor for UEFI compatible firmware☆228May 1, 2021Updated 4 years ago
- First open source and publicly available System Management Mode backdoor for UEFI based platforms. Good as general purpose playground for…☆629Oct 9, 2023Updated 2 years ago
- Open source library that implements translator and tools for REIL (Reverse Engineering Intermediate Language)☆512May 1, 2021Updated 4 years ago
- Platform Security Assessment Framework☆3,187Feb 24, 2026Updated last week
- Intel Engine & Graphics Firmware Analysis Tool☆1,243Dec 22, 2025Updated 2 months ago
- Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS☆105Jan 25, 2021Updated 5 years ago
- an open source toolkit for PCI bus exploration☆72Dec 18, 2016Updated 9 years ago
- Tools for working with Intel ME☆223Mar 17, 2017Updated 8 years ago
- CHIPSEC module that exploits UEFI boot script table vulnerability☆134Jan 25, 2016Updated 10 years ago
- The DrK Attack - Proof of concept☆347Mar 13, 2022Updated 3 years ago
- Tools to help with Reverse Engineering UEFI-based firmware☆400Mar 24, 2016Updated 9 years ago
- LPE exploits for Secret Net and Secret Net Studio☆52Mar 1, 2016Updated 10 years ago
- ☆74Jul 13, 2022Updated 3 years ago
- Kernel rootkit, that lives inside the Windows registry values data☆505Oct 8, 2017Updated 8 years ago
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)☆325May 9, 2016Updated 9 years ago
- HORSEPILL rootkit PoC☆234Aug 5, 2016Updated 9 years ago
- Demos of various injection techniques found in malware☆796Feb 15, 2022Updated 4 years ago
- The first open source vulnerability scanner for firmwares☆197Jul 18, 2016Updated 9 years ago
- System Management RAM analysis tool☆84Aug 9, 2024Updated last year
- Parse BIOS/Intel ME/UEFI firmware related structures: Volumes, FileSystems, Files, etc☆895Updated this week
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆971Dec 11, 2020Updated 5 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆287May 24, 2016Updated 9 years ago
- Modern Memory Safety in C/C++☆1,218Aug 1, 2016Updated 9 years ago
- Intel Management Engine JTAG Proof of Concept☆540Jun 12, 2020Updated 5 years ago
- Reverse engineering tool for automatic structure recovering and memory use analysis based on DynamoRIO and Capstone☆324Aug 12, 2019Updated 6 years ago
- Conference slides and White-papers☆360Jan 3, 2020Updated 6 years ago
- binary patching from Python☆639Jul 6, 2023Updated 2 years ago
- Return Oriented Programme Evolution with ROPER☆171Apr 25, 2019Updated 6 years ago
- Various PoCs☆502Jan 27, 2020Updated 6 years ago
- Intel Management Engine firmware loader plugin for IDA☆93Jul 27, 2017Updated 8 years ago
- LLDB MCP Integration + other helpful commands☆740Mar 29, 2025Updated 11 months ago
- metame is a metamorphic code engine for arbitrary executables☆599Oct 6, 2019Updated 6 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago
- My proof-of-concept exploits for the Linux kernel☆1,563Sep 11, 2025Updated 5 months ago
- JEFF file format tools☆27Dec 24, 2015Updated 10 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- How to backdoor Diffie-Hellman☆613Aug 20, 2016Updated 9 years ago