Cr4sh / fwexplLinks
PC firmware exploitation tool and library
☆257Updated 3 years ago
Alternatives and similar repositories for fwexpl
Users that are interested in fwexpl are comparing it to the libraries listed below
Sorting:
- PEI stage backdoor for UEFI compatible firmware☆227Updated 4 years ago
- CHIPSEC module that exploits UEFI boot script table vulnerability☆134Updated 9 years ago
- Intel Management Engine firmware loader plugin for IDA☆93Updated 8 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆438Updated 7 years ago
- ☆118Updated 5 years ago
- Some scripts for IDA Pro to assist with reverse engineering EFI binaries☆305Updated 6 years ago
- Conference slides and White-papers☆359Updated 6 years ago
- Hypervisor-based debugger☆191Updated 5 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆170Updated 9 years ago
- System Management RAM analysis tool☆83Updated last year
- A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.☆407Updated 11 years ago
- ☆99Updated last year
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 9 years ago
- Some scripts for IDA Pro to assist with reverse engineering EFI binaries☆79Updated 10 years ago
- Hypervisor-Level Debugger based on Radare2 / LibVMI, using VMI IO and debug plugins☆135Updated 7 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Updated 10 years ago
- gdbida - a visual bridge between a GDB session and IDA Pro's disassembler☆184Updated 7 years ago
- UEFI bootkit☆249Updated 12 years ago
- Windows XP 32-Bit Bootkit☆146Updated 11 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆310Updated 6 years ago
- DriverBuddy is an IDA Python script to assist with the reverse engineering of Windows kernel drivers.☆372Updated 6 years ago
- Two IDAPython Scripts help you to reconstruct Microsoft COM (Component Object Model) Code☆184Updated 5 years ago
- Loading unsigned code into kernel in Windows 10 (64) with help of VMware Workstation Pro/Player design flaw☆140Updated 8 years ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆75Updated 9 years ago
- Python scripts for reverse engineering.☆186Updated 4 years ago
- Automatically exported from code.google.com/p/ioctlfuzzer☆171Updated 10 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for x86 (Presented at BlackHat Asia 2017/2018, beVX 2018 and HITBSecConf 2017)☆188Updated 6 years ago
- TDL4 style rootkit to spoof read/write requests to master boot record☆131Updated 7 years ago
- Incident Response & Digital Forensics Debugging Extension☆386Updated 7 years ago
- A novel technique to hide code from debuggers & disassemblers☆159Updated last year