IOActive / PlatboxLinks
UEFI and SMM Assessment Tool
☆199Updated 9 months ago
Alternatives and similar repositories for Platbox
Users that are interested in Platbox are comparing it to the libraries listed below
Sorting:
- ☆94Updated last year
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆97Updated 8 years ago
- 👓A collection of papers/tools/exploits for UEFI security.☆185Updated 6 months ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆142Updated 4 years ago
- Binarly Vulnerability Research Advisories☆179Updated 3 weeks ago
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆234Updated 3 months ago
- A Binary Ninja plugin that automatically resolves type information for EFI protocol usage.☆38Updated 3 weeks ago
- Ghidra analyzer for UEFI firmware.☆358Updated last year
- This is an instruction to run your own SMM code.☆108Updated 4 years ago
- A custom ELF linker/loader for installing ET_REL binary patches at runtime☆169Updated last week
- Simple PoC for a bootkit written as a UEFI Option ROM Driver☆11Updated 2 years ago
- ☆187Updated 2 months ago
- IDA plugin for extending UEFI reverse engineering capabilities☆61Updated 3 years ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆239Updated last year
- Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board☆89Updated last year
- Binary exploitation by confusing the unwinder☆63Updated 2 years ago
- The runtime DXE driver monitoring access to the UEFI variables by hooking the runtime service table.☆145Updated 4 years ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆82Updated 2 years ago
- bypassing intel txt's tboot integrity checks via coreboot shim☆80Updated 5 months ago
- A tool for firmware cartography☆158Updated 2 months ago
- Helper plugin for analyzing UEFI firmware☆90Updated last year
- ☆131Updated 3 months ago
- Arbitrary Speculative Code Execution with Return Instructions☆162Updated last year
- A simple hypervisor demonstrating the use of the Intel VT-rp (redirect protection) technology.☆113Updated last year
- Information about a signed UEFI Shell that can be used when Secure Boot is enabled.☆80Updated 4 years ago
- EFI DXE Emulator and Interactive Debugger☆85Updated 5 years ago
- ☆23Updated 3 years ago
- SMM rootkit similar to LoJax or MosaicRegressor☆131Updated last year
- Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks☆330Updated last year
- Damn Vulnerable UEFI☆287Updated 11 months ago