binarly-io / SupplyChainAttacks
☆268Updated last month
Alternatives and similar repositories for SupplyChainAttacks:
Users that are interested in SupplyChainAttacks are comparing it to the libraries listed below
- A list of public attacks on BitLocker☆277Updated 2 months ago
- UEFI and SMM Assessment Tool☆188Updated 5 months ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆106Updated 2 years ago
- A Saleae Analyzer for TPM traffic that only requires the LADD & LFRAME signals, no clock.☆137Updated last year
- baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability☆324Updated last year
- Ghidra analyzer for UEFI firmware.☆344Updated 10 months ago
- A tool to explore USB-C on Apple devices using the Tamarin C Hardware.☆203Updated last year
- Damn Vulnerable UEFI☆275Updated 7 months ago
- ☆323Updated last year
- A repo for TPM sniffing greatness☆223Updated 4 months ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆231Updated last year
- Memory-Dump-UEFI is a UEFI application for dumping the contents of RAM.☆151Updated last month
- 🍞 BREAD: BIOS Reverse Engineering & Advanced Debugger☆304Updated last year
- Bootkit sample for firmware attack☆248Updated 4 months ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆298Updated 3 years ago
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆228Updated 3 months ago
- A simple, very experimental TPM sniffer for LPC bus☆596Updated last year
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆58Updated 10 months ago
- XZ backdoor reverse engineering☆92Updated 8 months ago
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆475Updated last year
- Ghidra utilities for analyzing PC firmware☆423Updated 3 months ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated last year
- Intel Management Engine JTAG Proof of Concept☆142Updated 4 years ago
- ☆92Updated 10 months ago
- Binarly Vulnerability Research Advisories☆171Updated 2 weeks ago
- Minimal setup to trigger the xz backdoor☆27Updated 6 months ago
- ☆128Updated 2 years ago
- Take back control of Windows Code Integrity, no exploits or patching required! Requires that you control your own Platform Key (PK).☆43Updated 2 years ago
- Secure boot objects recommended by Microsoft.☆48Updated last week
- playing with DDR DRAM bus fault injection☆91Updated 6 months ago