DavidBuchanan314 / dram_emfi
playing with DDR DRAM bus fault injection
☆87Updated 3 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for dram_emfi
- ☆93Updated last year
- The first analysis framework for CPU microcode☆373Updated last year
- CVE-2022-32947 walkthough and demo☆152Updated last year
- Overview of Secure-Launch process on Qualcomm devices☆55Updated 9 months ago
- XZ backdoor reverse engineering☆91Updated 3 months ago
- UEFI and SMM Assessment Tool☆167Updated 6 months ago
- PoC for PixieFail vulnerabilities☆20Updated 10 months ago
- A stealthy ELF loader - no files, no execve, no RWX☆155Updated 10 months ago
- libLISA: Instruction Discovery and Analysis on x86-64☆92Updated this week
- Damn Vulnerable UEFI☆247Updated 2 months ago
- ☆426Updated this week
- Proof-of-concept for the GhostWrite CPU bug.☆101Updated 3 months ago
- 📡🐧 Linux kernel syscall implementation tracker☆195Updated last week
- a tool for reinterpreting ELF executables and shared libraries☆266Updated 3 weeks ago
- simple type recognition in decompiled executables☆98Updated 4 months ago
- Intel Management Engine JTAG Proof of Concept☆139Updated 4 years ago
- A custom ELF linker/loader for installing ET_REL binary patches at runtime☆150Updated last month
- local language model for radare2☆94Updated this week
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆466Updated last year
- ☆82Updated 9 months ago
- easylkb - Easy Linux Kernel Builder☆330Updated 4 months ago
- Binary Type Inference Ghidra Plugin☆142Updated 9 months ago
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆101Updated 9 months ago
- IPv4 address turf war!☆71Updated last year
- 🌐🐧 Browsable linux kernel syscall tables built with Systrack (https://github.com/mebeim/systrack)☆146Updated last month
- Determine which CPU architecture is used in a binary file.☆104Updated 8 months ago
- A library to assist writing memory-unsafe code in "pure" python, without any imports (i.e. no ctypes etc.)☆217Updated 6 months ago
- ☆128Updated 2 years ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆103Updated last year
- Spectre based on Linear Address Masking☆64Updated 11 months ago