binarly-io / SupplyChainAttacksLinks
☆274Updated 9 months ago
Alternatives and similar repositories for SupplyChainAttacks
Users that are interested in SupplyChainAttacks are comparing it to the libraries listed below
Sorting:
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆114Updated 2 years ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆242Updated last year
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆315Updated 3 years ago
- A list of public attacks on BitLocker☆403Updated 5 months ago
- Ghidra analyzer for UEFI firmware.☆383Updated last year
- UEFI and SMM Assessment Tool☆209Updated last year
- A Saleae Analyzer for TPM traffic that only requires the LADD & LFRAME signals, no clock.☆151Updated 2 years ago
- 🍞 BREAD: BIOS Reverse Engineering & Advanced Debugger☆321Updated 2 months ago
- Intel Management Engine JTAG Proof of Concept☆145Updated 5 years ago
- baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability☆345Updated 2 years ago
- Memory-Dump-UEFI is a UEFI application for dumping the contents of RAM.☆192Updated 2 months ago
- A repo for TPM sniffing greatness☆241Updated last week
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆242Updated 8 months ago
- XZ backdoor reverse engineering☆99Updated last year
- Firmware Analysis Tool☆174Updated last year
- Damn Vulnerable UEFI☆297Updated last year
- libsigrok stacked Protocol Decoder for TPM 2.0 & TPM 1.2 transactions from an SPI bus. BitLocker Volume Master Key (VMK) are automaticall…☆25Updated 3 years ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆36Updated last month
- random dissectors☆68Updated 2 years ago
- Bootkit sample for firmware attack☆265Updated last year
- A low pin count sniffer for ICEStick - targeting TPM chips☆169Updated 5 years ago
- ☆329Updated 2 years ago
- a low pin count sniffer for icestick☆98Updated 6 years ago
- A framework for creating smart cards (ICC-based cards with contacts).☆135Updated last year
- "Pre-Owned" malware in ROM for AllWinner H616/H618 & RockChip RK3328 Android TV Boxes☆328Updated 2 years ago
- The xx file format. Turn your hex dumps into art, then into binary data.☆347Updated 2 years ago
- Binarly Vulnerability Research Advisories☆183Updated 2 months ago
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆175Updated 5 months ago
- JFFS2 filesystem extraction tool☆84Updated last month
- A Binary Ninja plugin that automatically resolves type information for EFI protocol usage.☆38Updated 5 months ago