PSPReverse / ftpm_attackLinks
Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"
☆109Updated 2 years ago
Alternatives and similar repositories for ftpm_attack
Users that are interested in ftpm_attack are comparing it to the libraries listed below
Sorting:
- Supplemental material to our paper: "One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization"☆89Updated 2 years ago
- Research tools developed for Intel Wi-Fi chips☆54Updated last week
- UEFI and SMM Assessment Tool☆191Updated 7 months ago
- Binja loader for AMD-SP or PSP firmware binaries.☆36Updated 2 years ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆237Updated last year
- iTLB multihit PoC☆41Updated last year
- ☆178Updated last week
- Overview of Secure-Launch process on Qualcomm devices☆60Updated last year
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆231Updated last month
- A repo for TPM sniffing greatness☆230Updated last month
- Intel Management Engine JTAG Proof of Concept☆141Updated 5 years ago
- a low pin count sniffer for icestick☆95Updated 6 years ago
- A Binary Ninja plugin that automatically resolves type information for EFI protocol usage.☆37Updated 2 months ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆29Updated 2 weeks ago
- libsigrok stacked Protocol Decoder for TPM 2.0 & TPM 1.2 transactions from an SPI bus. BitLocker Volume Master Key (VMK) are automaticall…☆25Updated 3 years ago
- A list of public attacks on BitLocker☆309Updated 4 months ago
- A tool for firmware cartography☆154Updated 2 weeks ago
- ☆52Updated 2 years ago
- ☆112Updated last year
- Documentation about the reversed engineered PSP interfaces/hardware components.☆28Updated 3 years ago
- ugly code to check linux kernel memory and dump some internal structures☆47Updated 7 months ago
- Determine which CPU architecture is used in a binary file.☆119Updated 3 months ago
- PSP emulator☆90Updated 4 years ago
- Binarly Vulnerability Research Advisories☆175Updated 2 weeks ago
- ☆41Updated last year
- ☆93Updated last year
- Arbitrary Speculative Code Execution with Return Instructions☆162Updated last year
- baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability☆329Updated last year
- Ghidra scripts for recovering string definitions in Go binaries☆115Updated 7 months ago
- Resources to get started with EMFI, based on my HWIO USA 2023 talk☆22Updated 11 months ago