Betraying the BIOS: Where the Guardians of the BIOS are Failing
☆59Jul 28, 2017Updated 8 years ago
Alternatives and similar repositories for BlackHat_2017
Users that are interested in BlackHat_2017 are comparing it to the libraries listed below
Sorting:
- ☆118Dec 3, 2020Updated 5 years ago
- Utility that can extract the internal forms represenation from both EFI and UEFI modules.☆19Oct 18, 2017Updated 8 years ago
- Intel Management Engine firmware loader plugin for IDA☆93Jul 27, 2017Updated 8 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Nov 15, 2012Updated 13 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- IP Address Listing Tool☆12Sep 1, 2013Updated 12 years ago
- An EFI image parser and dissector☆52Mar 20, 2013Updated 12 years ago
- This repository contains Python 2.7 scripts for parsing MFS/MFSB partition and extracting contained files.☆34Dec 19, 2017Updated 8 years ago
- CHIPSEC module that exploits UEFI boot script table vulnerability☆134Jan 25, 2016Updated 10 years ago
- My UEFI security talk on ZeroNights 2015☆58Dec 13, 2015Updated 10 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆32Mar 22, 2017Updated 8 years ago
- Some sample code from my Zero Nights 2017 presentation.☆60Nov 19, 2017Updated 8 years ago
- ☆63Apr 13, 2017Updated 8 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- Recon materials☆27Nov 18, 2017Updated 8 years ago
- Conference slides and White-papers☆360Jan 3, 2020Updated 6 years ago
- Implementation of the DIMVA 2017 publication "Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps"☆69Mar 7, 2022Updated 4 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- UAC 0Day all day!☆57Aug 15, 2017Updated 8 years ago
- ☆31Jan 4, 2018Updated 8 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Feb 13, 2017Updated 9 years ago
- Black Hat 2016 Slides, Paper and Code☆83Aug 10, 2016Updated 9 years ago
- ☆36Sep 5, 2017Updated 8 years ago
- ☆23Feb 9, 2018Updated 8 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- ☆10Jul 30, 2017Updated 8 years ago
- Prototype for an in memory fuzzer☆13Aug 1, 2017Updated 8 years ago
- ☆15Oct 4, 2012Updated 13 years ago
- UAC 0day, all day!☆281Jul 30, 2017Updated 8 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 8 years ago
- System Management RAM analysis tool☆84Aug 9, 2024Updated last year
- Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.☆51Jul 29, 2019Updated 6 years ago
- ☆12Dec 26, 2017Updated 8 years ago
- Accessing Microwire EEPROM 93LC86 from LC CH341A USB using SPI mode☆13Feb 23, 2019Updated 7 years ago
- Code for my blog post on combining S2E and Kaitai Struct☆15Jun 1, 2019Updated 6 years ago
- Blog series about Pwn Adventure 3: http://blog.keyidentity.com/tag/pwnadventure/☆38Oct 19, 2017Updated 8 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago