PSPReverse / PSPEmuLinks
PSP emulator
☆91Updated 4 years ago
Alternatives and similar repositories for PSPEmu
Users that are interested in PSPEmu are comparing it to the libraries listed below
Sorting:
- Supplemental material to our paper: "One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization"☆88Updated 3 years ago
- Binja loader for AMD-SP or PSP firmware binaries.☆38Updated 2 years ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆82Updated 2 years ago
- Documentation about the reversed engineered PSP interfaces/hardware components.☆28Updated 3 years ago
- Support of Nvidia Falcon processors for Ghidra☆72Updated last year
- A Ghidra processor module for the EFI Byte Code (EBC)☆32Updated 5 years ago
- ☆114Updated 2 years ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆33Updated 3 years ago
- ML-based ISA detection (architecture and endianness of binary code/sequences)☆66Updated 2 years ago
- Generic exploit for all version 7 (maybe others) LM32-based AMD SMU's used in APUs (and probably works on GPUs too)☆36Updated 2 years ago
- The DREAM decompiler☆44Updated 3 years ago
- Toshiba MeP processor module for GHIDRA☆71Updated 6 years ago
- ☆187Updated 3 months ago
- Renesas RL78 processor module for IDA☆17Updated 7 years ago
- setup Ghidra environment for GitHub Actions☆16Updated 2 years ago
- IDA plugin for extending UEFI reverse engineering capabilities☆61Updated 3 years ago
- Ghidra Data Type (GDT) Helper☆49Updated 3 years ago
- Cross-platform driver for the USB 3 xHCI Debug Capability☆20Updated 3 years ago
- ☆95Updated last year
- EFI DXE Emulator and Interactive Debugger☆86Updated 5 years ago
- Exploit generator for Intel ME 11 buffer overflow☆34Updated 5 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆169Updated last year
- ☆30Updated 3 years ago
- Standalone AArch64 Emulator Library☆72Updated 4 years ago
- EFI Byte Code Virtual Machine in userspace☆81Updated 2 years ago
- This is an instruction to run your own SMM code.☆108Updated 4 years ago
- Unofficial CMake build for Ghidra's C++ SLEIGH code☆159Updated this week
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆97Updated 8 years ago
- Ghidra P-Code emulation and static LLVM lifting in Python☆33Updated 3 years ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆142Updated 4 years ago