XenoKovah / IntelTXE-PoCLinks
Intel Management Engine JTAG Proof of Concept - 2022 Instructions
☆33Updated 3 years ago
Alternatives and similar repositories for IntelTXE-PoC
Users that are interested in IntelTXE-PoC are comparing it to the libraries listed below
Sorting:
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆83Updated 2 years ago
- ☆24Updated 4 years ago
- Binja loader for AMD-SP or PSP firmware binaries.☆38Updated 2 years ago
- A plugin for Binary Ninja to query the Symgrate2 database.☆13Updated 4 years ago
- EFI DXE Emulator and Interactive Debugger☆86Updated 5 years ago
- A Ghidra processor module for the EFI Byte Code (EBC)☆33Updated 5 years ago
- Helper plugin for analyzing UEFI firmware☆90Updated last year
- Ghidra P-Code emulation and static LLVM lifting in Python☆33Updated 3 years ago
- IDA plugin for extending UEFI reverse engineering capabilities☆62Updated 3 years ago
- Materials for my DMA attacks talk and a collection of related links☆57Updated last year
- Unicorn Engine port for UEFI firmware☆47Updated 6 months ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆66Updated 8 years ago
- RetDec plugin for LLDB. RetDec is a retargetable machine-code decompiler based on LLVM.☆62Updated 2 years ago
- This is an instruction to run your own SMM code.☆109Updated 4 years ago
- This plugin serves as a bridge between Binary Ninja and Ghidra's disassembler.☆36Updated 3 years ago
- EFI DXE Emulator and Interactive Debugger☆93Updated 5 years ago
- M1 bare metal project in Rust☆31Updated 3 years ago
- Adds a window to Binary Ninja that explains in simple-ish English what an instruction does☆56Updated 2 years ago
- ☆18Updated 4 years ago
- Simple PoC for a bootkit written as a UEFI Option ROM Driver☆11Updated 3 years ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆98Updated 8 years ago
- Common format for transferring and applying function information across binary analysis tools☆48Updated 3 months ago
- ☆15Updated 2 years ago
- ☆78Updated 3 years ago
- How to use LLVM passes☆35Updated 3 years ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆142Updated 4 years ago
- A Binary Ninja plugin that automatically resolves type information for EFI protocol usage.☆38Updated 2 months ago
- Python bit pattern library for instruction encodings. Bytes in, IR out!☆15Updated 3 years ago
- Modern C++, range-based Mach-O parser designed for embedded use. Uses stack allocations only.☆33Updated 2 years ago
- ☆188Updated last week