binarly-io / FwHuntLinks
The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.
☆233Updated last year
Alternatives and similar repositories for FwHunt
Users that are interested in FwHunt are comparing it to the libraries listed below
Sorting:
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆229Updated last month
- Ghidra utilities for analyzing PC firmware☆431Updated 4 months ago
- Binarly Vulnerability Research Advisories☆174Updated last month
- UEFI and SMM Assessment Tool☆190Updated 6 months ago
- Ghidra analyzer for UEFI firmware.☆348Updated last year
- ☆92Updated 11 months ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆97Updated 8 years ago
- A tool for UEFI firmware reverse engineering☆345Updated 5 months ago
- This repository contains the tools we used in our research on the Google Titan M chip☆188Updated 2 years ago
- IDA plugin and loader for UEFI firmware analysis and reverse engineering automation☆971Updated 2 weeks ago
- Intel Management Engine JTAG Proof of Concept☆141Updated 5 years ago
- Helper plugin for analyzing UEFI firmware☆90Updated last year
- A de-socketing library for fuzzing.☆147Updated 2 months ago
- CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is a "mirror" -- p…☆129Updated last month
- Arbitrary Speculative Code Execution with Return Instructions☆162Updated last year
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆439Updated last year
- Bootkit sample for firmware attack☆254Updated 6 months ago
- ☆148Updated last month
- ☆129Updated 3 weeks ago
- FitM, the Fuzzer in the Middle, can fuzz client and server binaries at the same time using userspace snapshot-fuzzing and network emulati…☆292Updated 3 years ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆109Updated 2 years ago
- Raw binary firmware analysis software☆536Updated 11 months ago
- ☆177Updated 2 weeks ago
- A U-Boot hacking toolkit for security researchers and tinkerers☆269Updated 2 years ago
- A tool for firmware cartography☆148Updated 5 months ago
- ☆320Updated 11 months ago
- GLM uCode dumps☆289Updated 5 years ago
- The TpmTool utility is a simple cross-platform tool for accessing TPM2.0 Non-Volatile (NV) Spaces (Index Values) on compliant systems, wi…☆144Updated 3 years ago
- baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability☆327Updated last year
- ☆20Updated 3 years ago