IOActive / PlatboxLinks
UEFI and SMM Assessment Tool
☆209Updated last year
Alternatives and similar repositories for Platbox
Users that are interested in Platbox are comparing it to the libraries listed below
Sorting:
- ☆95Updated last year
- 👓A collection of papers/tools/exploits for UEFI security.☆203Updated 4 months ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆100Updated 8 years ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆144Updated 4 years ago
- Binarly Vulnerability Research Advisories☆183Updated 2 months ago
- Ghidra analyzer for UEFI firmware.☆383Updated last year
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆243Updated 8 months ago
- Simple PoC for a bootkit written as a UEFI Option ROM Driver☆11Updated 3 years ago
- This is an instruction to run your own SMM code.☆109Updated 4 years ago
- ☆192Updated 3 months ago
- IDA plugin for extending UEFI reverse engineering capabilities☆63Updated 4 years ago
- A Binary Ninja plugin that automatically resolves type information for EFI protocol usage.☆38Updated 5 months ago
- A tool for firmware cartography☆162Updated last month
- ☆11Updated 8 years ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆88Updated 2 years ago
- ☆133Updated 3 months ago
- Helper plugin for analyzing UEFI firmware☆91Updated last year
- ☆24Updated 4 years ago
- A custom ELF linker/loader for installing ET_REL binary patches at runtime☆185Updated 3 weeks ago
- Determine which CPU architecture is used in a binary file.☆125Updated 10 months ago
- Arbitrary Speculative Code Execution with Return Instructions☆175Updated last year
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆50Updated last year
- EFI DXE Emulator and Interactive Debugger☆87Updated 5 years ago
- ☆188Updated 2 years ago
- Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks☆350Updated 2 years ago
- Binary exploitation by confusing the unwinder☆67Updated 2 years ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆242Updated last year
- The first analysis framework for CPU microcode☆411Updated 2 years ago
- machine check exploitation☆52Updated 5 months ago
- A snapshotting, coverage-guided fuzzer for software (UEFI, Kernel, firmware, BIOS) built on SIMICS☆324Updated last month