PSPReverse / amd-nv-toolLinks
amd-nv-tool can extract and modify information from BIOS images of AMD systems
☆14Updated 2 years ago
Alternatives and similar repositories for amd-nv-tool
Users that are interested in amd-nv-tool are comparing it to the libraries listed below
Sorting:
- Microarchitectural weird machine implementation using exceptions, TSX, branch predictors, and branch target buffers.☆14Updated 2 years ago
- NAND (JEDEC / ONFI) Analyzer for Saleae Logic☆14Updated last year
- Dracula inspired theme for Ghidra☆12Updated 5 years ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆33Updated 2 years ago
- Binja loader for AMD-SP or PSP firmware binaries.☆36Updated 2 years ago
- A simple MIPS to LLVM IR recompiler with ahead-of-time recompilation support☆44Updated 5 years ago
- Renesas RL78 processor module for IDA☆17Updated 7 years ago
- Generic exploit for all version 7 (maybe others) LM32-based AMD SMU's used in APUs (and probably works on GPUs too)☆37Updated 2 years ago
- Teensy 4.x firmware for Voltage Fault Injection research☆13Updated 7 months ago
- Support of Nvidia Falcon processors for Ghidra☆72Updated 11 months ago
- Supplemental material to our paper: "One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization"☆88Updated 2 years ago
- correlate an SPI capture of an AMD boot procedure to the PSP firmware components☆13Updated 4 months ago
- Efficient C implementation of Differential Fault Analysis on AES (round 8 or 9)☆27Updated 7 months ago
- Formally verified x86-64 decompilation☆42Updated 3 weeks ago
- Use hardware performance counters to find mapping of addresses to L3 slices in Intel processors☆16Updated 2 years ago
- LM32 processor module for Ghidra. Useful for AMD SMU reverse engineering.☆14Updated 3 years ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆82Updated 2 years ago
- Waveform Generator☆11Updated 3 years ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Updated last year
- A Ghidra processor module for the EFI Byte Code (EBC)☆32Updated 5 years ago
- SD/MMC Analyzer for Saleae Logic☆37Updated last year
- An implementation of the RL78 ISA for Ghidra SRE☆27Updated 4 years ago
- ☆187Updated 2 months ago
- Write a Ghidra Extension without using Java or Eclipse!☆19Updated 6 months ago
- ☆20Updated 3 years ago
- Ghidra P-Code emulation and static LLVM lifting in Python☆34Updated 3 years ago
- MediaTek MD32 processor module for Ghidra.☆15Updated last year
- Documentation about the reversed engineered PSP interfaces/hardware components.☆28Updated 3 years ago
- A binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis☆13Updated 2 years ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆50Updated 2 months ago