IOActive / Platbox
UEFI and SMM Assessment Tool
☆173Updated this week
Related projects ⓘ
Alternatives and complementary repositories for Platbox
- ☆89Updated 5 months ago
- Binarly Vulnerability Research Advisories☆168Updated 2 months ago
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆214Updated 2 months ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆134Updated 3 years ago
- Helper plugin for analyzing UEFI firmware☆90Updated 5 months ago
- Ghidra analyzer for UEFI firmware.☆316Updated 5 months ago
- 👓A collection of papers/tools/exploits for UEFI security.☆122Updated 3 months ago
- Damn Vulnerable UEFI☆256Updated 2 months ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆92Updated 7 years ago
- Determine which CPU architecture is used in a binary file.☆104Updated 8 months ago
- A bare minimum hypervisor on AMD and Intel processors for learners.☆193Updated last week
- A tool for firmware cartography☆138Updated 8 months ago
- ☆175Updated 11 months ago
- Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks☆279Updated last year
- The first analysis framework for CPU microcode☆373Updated last year
- ☆306Updated 5 months ago
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆45Updated 2 weeks ago
- SMM UEFI module and client for UMD privilege escalation☆30Updated last year
- The Windbg extension that implements commands helpful to study Hyper-V on Intel processors.☆130Updated last month
- IDA plugin for extending UEFI reverse engineering capabilities☆55Updated 3 years ago
- A custom ELF linker/loader for installing ET_REL binary patches at runtime☆151Updated last month
- ☆163Updated 9 months ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆228Updated 8 months ago
- This is an instruction to run your own SMM code.☆100Updated 3 years ago
- ☆100Updated last month
- ☆59Updated this week
- Binary exploitation by confusing the unwinder☆59Updated last year
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆152Updated 2 years ago
- Targeting Windows Kernel Driver Fuzzer☆142Updated last week
- Arbitrary Speculative Code Execution with Return Instructions☆153Updated 10 months ago