PSPReverse / PSPEmuLinks
PSP emulator
☆93Updated 4 years ago
Alternatives and similar repositories for PSPEmu
Users that are interested in PSPEmu are comparing it to the libraries listed below
Sorting:
- Supplemental material to our paper: "One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization"☆92Updated 3 years ago
- Documentation about the reversed engineered PSP interfaces/hardware components.☆28Updated 3 years ago
- Binja loader for AMD-SP or PSP firmware binaries.☆39Updated 2 years ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆84Updated 2 years ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Updated 3 years ago
- Support of Nvidia Falcon processors for Ghidra☆73Updated last year
- A Ghidra processor module for the EFI Byte Code (EBC)☆33Updated 5 years ago
- ☆115Updated 2 years ago
- EFI DXE Emulator and Interactive Debugger☆87Updated 5 years ago
- Generic exploit for all version 7 (maybe others) LM32-based AMD SMU's used in APUs (and probably works on GPUs too)☆37Updated 2 years ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆98Updated 8 years ago
- ☆189Updated last month
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆70Updated last year
- MFS and CFG file manipulation utility☆30Updated 5 years ago
- IDA plugin for extending UEFI reverse engineering capabilities☆62Updated 4 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆172Updated last year
- Ghidra Data Type (GDT) Helper☆52Updated 3 years ago
- ☆92Updated last year
- Exploit generator for Intel ME 11 buffer overflow☆34Updated 6 years ago
- Toshiba MeP processor module for GHIDRA☆71Updated 6 years ago
- Renesas RL78 processor module for IDA☆17Updated 7 years ago
- PowerPC to C plugin for IDA☆61Updated 9 years ago
- System Management RAM analysis tool☆83Updated last year
- This is an instruction to run your own SMM code.☆109Updated 4 years ago
- ML-based ISA detection (architecture and endianness of binary code/sequences)☆67Updated 2 years ago
- Dynamic binary translator for x86 binaries☆38Updated 2 years ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆68Updated 9 years ago
- ☆94Updated last year
- Unicorn Engine port for UEFI firmware☆48Updated 7 months ago
- Helper plugin for analyzing UEFI firmware☆89Updated last year