binarly-io / FwHunt
The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.
☆231Updated last year
Alternatives and similar repositories for FwHunt:
Users that are interested in FwHunt are comparing it to the libraries listed below
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆227Updated 3 months ago
- Ghidra utilities for analyzing PC firmware☆419Updated 2 months ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆96Updated 7 years ago
- ☆92Updated 9 months ago
- Ghidra analyzer for UEFI firmware.☆343Updated 9 months ago
- UEFI and SMM Assessment Tool☆183Updated 4 months ago
- Intel Management Engine JTAG Proof of Concept☆142Updated 4 years ago
- Binarly Vulnerability Research Advisories☆171Updated last week
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆436Updated 11 months ago
- Bootkit sample for firmware attack☆246Updated 4 months ago
- This repository contains the tools we used in our research on the Google Titan M chip☆186Updated 2 years ago
- A tool for UEFI firmware reverse engineering☆340Updated 3 months ago
- Kernel Fuzzer for Xen Project (KF/x) - Hypervisor-based fuzzing using Xen VM forking, VMI & AFL☆472Updated 8 months ago
- Helper plugin for analyzing UEFI firmware☆90Updated 9 months ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆105Updated last year
- A snapshotting, coverage-guided fuzzer for software (UEFI, Kernel, firmware, BIOS) built on SIMICS☆297Updated this week
- ☆315Updated 9 months ago
- IDA plugin and loader for UEFI firmware analysis and reverse engineering automation☆954Updated this week
- A de-socketing library for fuzzing.☆141Updated 2 weeks ago
- This repository contains exploit and reverse-engineering source code regarding the Spectre-BHB/Branch History Injection vulnerability☆113Updated 2 years ago
- ☆144Updated 5 months ago
- The TpmTool utility is a simple cross-platform tool for accessing TPM2.0 Non-Volatile (NV) Spaces (Index Values) on compliant systems, wi…☆142Updated 3 years ago
- ☆32Updated 7 years ago
- FitM, the Fuzzer in the Middle, can fuzz client and server binaries at the same time using userspace snapshot-fuzzing and network emulati…☆287Updated 2 years ago
- ☆173Updated 3 weeks ago
- Arbitrary Speculative Code Execution with Return Instructions☆157Updated last year
- ☆120Updated 3 weeks ago
- A stealthy ELF loader - no files, no execve, no RWX☆160Updated last year
- CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is a "mirror" -- p…☆126Updated 4 months ago
- Vault Exploit Defense☆124Updated 6 months ago