binarly-io / FwHuntLinks
The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.
☆239Updated last year
Alternatives and similar repositories for FwHunt
Users that are interested in FwHunt are comparing it to the libraries listed below
Sorting:
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆234Updated 3 months ago
- Binarly Vulnerability Research Advisories☆179Updated last month
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆97Updated 8 years ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆112Updated 2 years ago
- UEFI and SMM Assessment Tool☆199Updated 9 months ago
- Ghidra utilities for analyzing PC firmware☆446Updated 7 months ago
- ☆94Updated last year
- Intel Management Engine JTAG Proof of Concept☆143Updated 5 years ago
- Bootkit sample for firmware attack☆257Updated 8 months ago
- Arbitrary Speculative Code Execution with Return Instructions☆163Updated last year
- A tool for firmware cartography☆158Updated 2 months ago
- ☆20Updated 4 years ago
- Ghidra analyzer for UEFI firmware.☆359Updated last year
- Firmware Analysis Tool☆170Updated 9 months ago
- ☆327Updated last year
- CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is a "mirror" -- p…☆131Updated this week
- Helper plugin for analyzing UEFI firmware☆90Updated last year
- Reverse engineering software using a full system simulator☆183Updated last week
- GLM uCode dumps☆289Updated 5 years ago
- A tool for UEFI firmware reverse engineering☆355Updated 8 months ago
- ☆65Updated 6 months ago
- This repository contains the tools we used in our research on the Google Titan M chip☆192Updated 3 years ago
- Fork of aeskeyfind that knows more formats of AES key schedule☆65Updated 8 years ago
- ☆131Updated 3 months ago
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆452Updated last year
- ☆32Updated 8 years ago
- ☆187Updated 2 months ago
- Code Coverage Exploration Plugin for Ghidra☆358Updated last year
- ☆112Updated 2 years ago
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆162Updated 2 years ago