binarly-io / FwHuntLinks
The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.
☆241Updated last year
Alternatives and similar repositories for FwHunt
Users that are interested in FwHunt are comparing it to the libraries listed below
Sorting:
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆235Updated 4 months ago
- Binarly Vulnerability Research Advisories☆180Updated last week
- Ghidra utilities for analyzing PC firmware☆447Updated 8 months ago
- UEFI and SMM Assessment Tool☆199Updated 9 months ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆97Updated 8 years ago
- ☆95Updated last year
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆112Updated 2 years ago
- Bootkit sample for firmware attack☆259Updated 9 months ago
- Firmware Analysis Tool☆171Updated 10 months ago
- Ghidra analyzer for UEFI firmware.☆362Updated last year
- Arbitrary Speculative Code Execution with Return Instructions☆169Updated last year
- Helper plugin for analyzing UEFI firmware☆90Updated last year
- ☆32Updated 8 years ago
- A tool for UEFI firmware reverse engineering☆356Updated 8 months ago
- ☆20Updated 4 years ago
- Intel Management Engine JTAG Proof of Concept☆144Updated 5 years ago
- CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is a "mirror" -- p…☆132Updated 3 weeks ago
- ☆112Updated 2 years ago
- A tool for firmware cartography☆158Updated 3 months ago
- Fork of aeskeyfind that knows more formats of AES key schedule☆65Updated 8 years ago
- ☆327Updated last year
- Binary Type Inference Ghidra Plugin☆166Updated last year
- Reverse engineering software using a full system simulator☆185Updated this week
- Ghidra scripts for recovering string definitions in Go binaries☆118Updated 10 months ago
- baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability☆341Updated last year
- The TpmTool utility is a simple cross-platform tool for accessing TPM2.0 Non-Volatile (NV) Spaces (Index Values) on compliant systems, wi…☆147Updated 4 years ago
- ☆131Updated 4 months ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆266Updated 9 months ago
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆453Updated last year
- Tool for decrypting the firmware files for Samsung SSDs☆224Updated 4 years ago