Cr4sh / smram_parse
System Management RAM analysis tool
☆77Updated 8 months ago
Alternatives and similar repositories for smram_parse:
Users that are interested in smram_parse are comparing it to the libraries listed below
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆66Updated 8 years ago
- EFI DXE Emulator and Interactive Debugger☆85Updated 5 years ago
- EFI DXE Emulator and Interactive Debugger☆88Updated 5 years ago
- Some scripts for IDA Pro to assist with reverse engineering EFI binaries☆75Updated 9 years ago
- IDA plugin for extending UEFI reverse engineering capabilities☆59Updated 3 years ago
- Helper plugin for analyzing UEFI firmware☆90Updated 11 months ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆139Updated 4 years ago
- Intel Management Engine firmware loader plugin for IDA☆91Updated 7 years ago
- The sample DXE runtime driver demonstrating how to program DMA remapping.☆58Updated last year
- This is an instruction to run your own SMM code.☆103Updated 4 years ago
- Python bindings for the Microsoft Hypervisor Platform APIs.☆80Updated 5 years ago
- Hypervisor-based debugger☆187Updated 4 years ago
- Elevation of privilege detector based on HyperPlatform☆120Updated 8 years ago
- My UEFI security talk on ZeroNights 2015☆57Updated 9 years ago
- ☆21Updated 3 years ago
- ☆51Updated 3 years ago
- A Ghidra processor module for the EFI Byte Code (EBC)☆31Updated 4 years ago
- VMX intrinsics plugin for Hex-Rays decompiler☆70Updated 5 years ago
- ☆10Updated 8 years ago
- SentinelOne's KeRnel Exploits Advanced Mitigations☆53Updated 6 years ago
- IntelVT-X nice feature -> tool☆94Updated 10 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆26Updated last year
- A fast execution trace symbolizer for Windows.☆130Updated last year
- The runtime DXE driver monitoring access to the UEFI variables by hooking the runtime service table.☆139Updated 4 years ago
- ☆74Updated 4 years ago
- ☆34Updated 3 years ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆96Updated 7 years ago
- Python module for platform, iospace and physmem inspection☆24Updated 5 years ago
- ☆73Updated 7 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 8 years ago