binarly-io / FwHuntLinks
The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.
☆237Updated last year
Alternatives and similar repositories for FwHunt
Users that are interested in FwHunt are comparing it to the libraries listed below
Sorting:
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆231Updated last month
- Binarly Vulnerability Research Advisories☆175Updated 2 weeks ago
- UEFI and SMM Assessment Tool☆191Updated 7 months ago
- Ghidra utilities for analyzing PC firmware☆435Updated 5 months ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆97Updated 8 years ago
- Ghidra analyzer for UEFI firmware.☆350Updated last year
- ☆93Updated last year
- Bootkit sample for firmware attack☆256Updated 6 months ago
- Intel Management Engine JTAG Proof of Concept☆141Updated 5 years ago
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆442Updated last year
- A tool for UEFI firmware reverse engineering☆347Updated 5 months ago
- Reverse engineering software using a full system simulator☆182Updated last week
- IDA plugin and loader for UEFI firmware analysis and reverse engineering automation☆980Updated 2 weeks ago
- A snapshotting, coverage-guided fuzzer for software (UEFI, Kernel, firmware, BIOS) built on SIMICS☆304Updated last week
- Helper plugin for analyzing UEFI firmware☆90Updated last year
- A tool for firmware cartography☆154Updated 2 weeks ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆109Updated 2 years ago
- ☆320Updated last year
- This repository contains the tools we used in our research on the Google Titan M chip☆188Updated 2 years ago
- CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is a "mirror" -- p…☆129Updated 2 weeks ago
- ☆178Updated last week
- Ghidra scripts for recovering string definitions in Go binaries☆115Updated 7 months ago
- Arbitrary Speculative Code Execution with Return Instructions☆162Updated last year
- ☆130Updated last month
- A de-socketing library for fuzzing.☆151Updated 2 weeks ago
- ☆183Updated last year
- Code Coverage Exploration Plugin for Ghidra☆355Updated 11 months ago
- Snapshot-based coverage-guided windows kernel fuzzer☆319Updated 3 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆258Updated 7 months ago
- EMBArk - The firmware security scanning environment☆344Updated this week