DavidBuchanan314 / dram_emfiLinks
playing with DDR DRAM bus fault injection
☆91Updated 7 months ago
Alternatives and similar repositories for dram_emfi
Users that are interested in dram_emfi are comparing it to the libraries listed below
Sorting:
- Overview of Secure-Launch process on Qualcomm devices☆59Updated last year
- ☆95Updated last year
- Determine which CPU architecture is used in a binary file.☆119Updated 2 months ago
- Proof-of-concept for the GhostWrite CPU bug.☆113Updated 9 months ago
- Memory-Dump-UEFI is a UEFI application for dumping the contents of RAM.☆154Updated 2 months ago
- UEFI and SMM Assessment Tool☆190Updated 6 months ago
- An exploit chain for the Magic Leap One (and probably other TX2 devices)☆52Updated 3 weeks ago
- A stealthy ELF loader - no files, no execve, no RWX☆165Updated last year
- XZ backdoor reverse engineering☆95Updated 10 months ago
- libLISA: Instruction Discovery and Analysis on x86-64☆113Updated 3 months ago
- CVE-2022-32947 walkthough and demo☆172Updated last year
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆103Updated last year
- 🌐🐧 Browsable Linux kernel syscall tables built with Systrack (https://github.com/mebeim/systrack)☆182Updated last month
- Damn Vulnerable UEFI☆279Updated 8 months ago
- ☆48Updated 2 months ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆82Updated 2 years ago
- ☆426Updated 5 months ago
- A library to assist writing memory-unsafe code in "pure" python, without any imports (i.e. no ctypes etc.)☆223Updated 3 months ago
- A custom ELF linker/loader for installing ET_REL binary patches at runtime☆166Updated 2 months ago
- Training in Transient Execution and PhantomCALL, from Inception (SEC'23) Artifacts.☆36Updated last year
- CLI tool and Ghidra plug-in for analyzing binaries using under-constrained symbolic execution☆111Updated last week
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆109Updated 2 years ago
- a tool for reinterpreting ELF executables and shared libraries☆320Updated 6 months ago
- 📡🐧 Linux kernel syscall implementation tracker☆214Updated 2 months ago
- Student Starter Code for Secure Hardware Design at MIT☆75Updated last year
- VirtFuzz is a Linux Kernel Fuzzer that uses VirtIO to provide inputs into the kernels subsystem. It is built with LibAFL.☆122Updated 11 months ago
- ☆99Updated 4 months ago
- simple type recognition in decompiled executables☆110Updated 11 months ago
- Quarkslab Bindiffer but not only !☆202Updated last month
- The first analysis framework for CPU microcode☆393Updated 2 years ago