XenoKovah / IntelTXE-PoC
Intel Management Engine JTAG Proof of Concept - 2022 Instructions
☆32Updated 2 years ago
Related projects: ⓘ
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆77Updated last year
- Helper library for using the IPC CLI python module of OpenIPC☆11Updated 4 years ago
- Materials for my DMA attacks talk and a collection of related links☆38Updated 3 months ago
- EFI DXE Emulator and Interactive Debugger☆82Updated 4 years ago
- A plugin for Binary Ninja to query the Symgrate2 database.☆13Updated 3 years ago
- A Ghidra processor module for the EFI Byte Code (EBC)☆29Updated 4 years ago
- EFI DXE Emulator and Interactive Debugger☆85Updated 4 years ago
- ☆27Updated 2 years ago
- ☆10Updated 7 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆24Updated last year
- IDA plugin for extending UEFI reverse engineering capabilities☆54Updated 2 years ago
- ☆19Updated 3 years ago
- This is an instruction to run your own SMM code.☆100Updated 3 years ago
- Unicorn Engine port for UEFI firmware☆41Updated 4 months ago
- System Management RAM analysis tool☆72Updated last month
- A simple IDA Pro plugin to show all HexRays decompiler comments written by user☆20Updated 3 years ago
- The sample DXE runtime driver demonstrating how to program DMA remapping.☆57Updated 8 months ago
- Helper plugin for analyzing UEFI firmware☆87Updated 3 months ago
- UEFI UEFI UEFI☆36Updated last year
- Ghidra P-Code emulation and static LLVM lifting in Python☆26Updated 2 years ago
- A collection of Ghidra scripts and tools to improve UEFI Binary Analysis and automation☆9Updated 2 months ago
- A library to translate native code for multiple architectures into Tiny Code Generator (TCG) based intermediate representation (IR), base…☆44Updated 4 years ago
- Runtime smm module loader☆30Updated last year
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆61Updated 7 years ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆133Updated 3 years ago
- A simple example of using Windows Hypervisor Platform (WHP)☆10Updated 3 years ago
- Breaking Secure Boot with SMM☆40Updated 2 years ago
- MFS and CFG file manipulation utility☆26Updated 4 years ago
- This plugin serves as a bridge between Binary Ninja and Ghidra's disassembler.☆25Updated 2 years ago
- VMX intrinsics plugin for Hex-Rays decompiler☆69Updated 4 years ago