abazhaniuk / firmware-security-training
☆32Updated 8 years ago
Alternatives and similar repositories for firmware-security-training
Users that are interested in firmware-security-training are comparing it to the libraries listed below
Sorting:
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆97Updated 8 years ago
- Python module for platform, iospace and physmem inspection☆24Updated 5 years ago
- Helper plugin for analyzing UEFI firmware☆90Updated 11 months ago
- System Management RAM analysis tool☆78Updated 9 months ago
- EFI DXE Emulator and Interactive Debugger☆85Updated 5 years ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆66Updated 8 years ago
- ☆92Updated 10 months ago
- ☆43Updated 3 years ago
- This is an instruction to run your own SMM code.☆104Updated 4 years ago
- ☆27Updated 3 years ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆140Updated 4 years ago
- EFI DXE Emulator and Interactive Debugger☆88Updated 5 years ago
- Breaking Secure Boot with SMM☆40Updated 3 years ago
- ☆21Updated 3 years ago
- My UEFI security talk on ZeroNights 2015☆57Updated 9 years ago
- IDA plugin for extending UEFI reverse engineering capabilities☆59Updated 3 years ago
- ugly code to check linux kernel memory and dump some internal structures☆46Updated 5 months ago
- The runtime DXE driver monitoring access to the UEFI variables by hooking the runtime service table.☆140Updated 4 years ago
- Simple PoC for a bootkit written as a UEFI Option ROM Driver☆10Updated 2 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆111Updated 6 years ago
- The sample DXE runtime driver demonstrating how to program DMA remapping.☆58Updated last year
- ☆73Updated 7 years ago
- ☆70Updated 5 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆26Updated last year
- Information about a signed UEFI Shell that can be used when Secure Boot is enabled.☆78Updated 4 years ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆82Updated 2 years ago
- ☆65Updated 5 years ago
- ☆90Updated last year
- Python bindings for the Microsoft Hypervisor Platform APIs.☆80Updated 5 years ago
- Intel Management Engine firmware loader plugin for IDA☆91Updated 7 years ago