Sentinel-One / brick
☆92Updated 9 months ago
Alternatives and similar repositories for brick:
Users that are interested in brick are comparing it to the libraries listed below
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆137Updated 4 years ago
- IDA plugin for extending UEFI reverse engineering capabilities☆59Updated 3 years ago
- EFI DXE Emulator and Interactive Debugger☆82Updated 4 years ago
- This is an instruction to run your own SMM code.☆102Updated 4 years ago
- EFI DXE Emulator and Interactive Debugger☆88Updated 5 years ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆96Updated 7 years ago
- Bindings for Microsoft WinDBG TTD☆220Updated last year
- ☆144Updated 5 months ago
- Helper plugin for analyzing UEFI firmware☆90Updated 10 months ago
- ☆43Updated 3 years ago
- Multi-tool reverse engineering collaboration solution.☆138Updated last year
- System Management RAM analysis tool☆76Updated 8 months ago
- Binarly Vulnerability Research Advisories☆171Updated this week
- The runtime DXE driver monitoring access to the UEFI variables by hooking the runtime service table.☆138Updated 4 years ago
- Hyper-V scripts☆119Updated last year
- Slides, recordings and materials of my public presentations, talks and workshops.☆77Updated 2 weeks ago
- ☆143Updated last year
- This framework enables user to discover JOP gagdets and can automate building a complete JOP chain to bypass DEP. JOP ROCKET is the ultim…☆103Updated 7 months ago
- 👓A collection of papers/tools/exploits for UEFI security.☆159Updated 2 months ago
- Making Type Info Library (TIL) file for Apache modules☆55Updated 4 years ago
- ☆120Updated last month
- A /proc/mem IDA loader to snapshot a running process☆161Updated 2 years ago
- UEFI and SMM Assessment Tool☆185Updated 4 months ago
- Breaking Secure Boot with SMM☆40Updated 3 years ago
- Hyper-V Research is trendy now☆159Updated last month
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆66Updated 8 years ago
- Analyses in IDA/Hex-Rays☆81Updated 2 years ago
- This project tries to provide additional Ghidra Version Tracking Correlators suitable for patch diffing.☆91Updated last year
- Devirtualize Virtual Calls☆115Updated 2 years ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆87Updated 3 years ago