DavidBuchanan314 / dram_emfi
playing with DDR DRAM bus fault injection
☆91Updated 6 months ago
Alternatives and similar repositories for dram_emfi:
Users that are interested in dram_emfi are comparing it to the libraries listed below
- ☆94Updated last year
- Overview of Secure-Launch process on Qualcomm devices☆57Updated last year
- CVE-2022-32947 walkthough and demo☆171Updated last year
- Proof-of-concept for the GhostWrite CPU bug.☆110Updated 8 months ago
- a tool for reinterpreting ELF executables and shared libraries☆317Updated 5 months ago
- UEFI and SMM Assessment Tool☆188Updated 5 months ago
- 🌐🐧 Browsable Linux kernel syscall tables built with Systrack (https://github.com/mebeim/systrack)☆171Updated last week
- libLISA: Instruction Discovery and Analysis on x86-64☆112Updated 2 months ago
- A custom ELF linker/loader for installing ET_REL binary patches at runtime☆163Updated 3 weeks ago
- Damn Vulnerable UEFI☆275Updated 7 months ago
- XZ backdoor reverse engineering☆92Updated 8 months ago
- Memory-Dump-UEFI is a UEFI application for dumping the contents of RAM.☆150Updated last month
- Arbitrary Speculative Code Execution with Return Instructions☆159Updated last year
- A stealthy ELF loader - no files, no execve, no RWX☆161Updated last year
- The first analysis framework for CPU microcode☆391Updated 2 years ago
- Student Starter Code for Secure Hardware Design at MIT☆72Updated 10 months ago
- ☆45Updated last month
- PoC for PixieFail vulnerabilities☆22Updated last year
- A Rowhammer fuzzer for AMD Zen-based systems (USENIX Security '24).☆51Updated last month
- simple type recognition in decompiled executables☆107Updated 9 months ago
- Binary Ninja plugin for the Avnera AV6xxx/AV7xxx architecture☆28Updated 2 weeks ago
- TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution (IEEE S&P 2025)☆63Updated 4 months ago
- ☆426Updated 4 months ago
- Determine which CPU architecture is used in a binary file.☆116Updated last month
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆81Updated 2 years ago
- Training in Transient Execution and PhantomCALL, from Inception (SEC'23) Artifacts.☆35Updated last year
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆102Updated last year
- 📡🐧 Linux kernel syscall implementation tracker☆210Updated 3 weeks ago
- Binary Type Inference Ghidra Plugin☆155Updated last year
- ☆174Updated last month