Cr4sh / fwexpl
PC firmware exploitation tool and library
☆251Updated 2 years ago
Alternatives and similar repositories for fwexpl:
Users that are interested in fwexpl are comparing it to the libraries listed below
- PEI stage backdoor for UEFI compatible firmware☆220Updated 3 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆432Updated 6 years ago
- Hypervisor-based debugger☆187Updated 4 years ago
- Some scripts for IDA Pro to assist with reverse engineering EFI binaries☆297Updated 5 years ago
- Loading unsigned code into kernel in Windows 10 (64) with help of VMware Workstation Pro/Player design flaw☆135Updated 8 years ago
- DriverBuddy is an IDA Python script to assist with the reverse engineering of Windows kernel drivers.☆359Updated 5 years ago
- CHIPSEC module that exploits UEFI boot script table vulnerability☆133Updated 9 years ago
- Automatically exported from code.google.com/p/ioctlfuzzer☆160Updated 9 years ago
- Intel Management Engine firmware loader plugin for IDA☆90Updated 7 years ago
- Python scripts for reverse engineering.☆183Updated 3 years ago
- UEFI bootkit☆244Updated 12 years ago
- ☆118Updated 4 years ago
- PEDA-like debugger UI for WinDbg☆203Updated last year
- Some scripts for IDA Pro to assist with reverse engineering EFI binaries☆74Updated 9 years ago
- The history of Windows Internals via symbols.☆176Updated 3 years ago
- ☆99Updated 9 months ago
- Conference slides and White-papers☆356Updated 5 years ago
- windows syscall table from xp ~ 10 rs4☆353Updated 6 years ago
- System Management RAM analysis tool☆76Updated 8 months ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆284Updated 8 years ago
- qb-sync is an open source tool to add some helpful glue between IDA Pro and Windbg. Its core feature is to dynamically synchronize IDA's …☆120Updated 9 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆132Updated 9 years ago
- A tool for UEFI firmware reverse engineering☆342Updated 3 months ago
- An analysis of the Warbird virtual-machine protection for the CI!g_pStore☆248Updated 7 years ago
- Two IDAPython Scripts help you to reconstruct Microsoft COM (Component Object Model) Code☆181Updated 4 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆302Updated 6 years ago
- Hypervisor-Level Debugger based on Radare2 / LibVMI, using VMI IO and debug plugins☆133Updated 6 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆163Updated 8 years ago
- The runtime DXE driver monitoring access to the UEFI variables by hooking the runtime service table.☆138Updated 4 years ago
- Tools to help with Reverse Engineering UEFI-based firmware☆379Updated 9 years ago