binarly-io / SupplyChainAttacksLinks
☆273Updated 7 months ago
Alternatives and similar repositories for SupplyChainAttacks
Users that are interested in SupplyChainAttacks are comparing it to the libraries listed below
Sorting:
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆113Updated 2 years ago
 - A list of public attacks on BitLocker☆387Updated 2 months ago
 - Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆308Updated 3 years ago
 - The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆241Updated last year
 - A Saleae Analyzer for TPM traffic that only requires the LADD & LFRAME signals, no clock.☆147Updated 2 years ago
 - Memory-Dump-UEFI is a UEFI application for dumping the contents of RAM.☆182Updated last week
 - ☆326Updated 2 years ago
 - baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability☆345Updated 2 years ago
 - Intel Management Engine JTAG Proof of Concept☆145Updated 5 years ago
 - Damn Vulnerable UEFI☆289Updated last year
 - Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
 - 🍞 BREAD: BIOS Reverse Engineering & Advanced Debugger☆315Updated 2 weeks ago
 - UEFI and SMM Assessment Tool☆208Updated 11 months ago
 - A repo for TPM sniffing greatness☆238Updated last month
 - A tool to explore USB-C on Apple devices using the Tamarin C Hardware.☆221Updated last year
 - Ghidra analyzer for UEFI firmware.☆367Updated last year
 - Bootkit sample for firmware attack☆260Updated 11 months ago
 - Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆31Updated 4 months ago
 - Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆58Updated last year
 - libsigrok stacked Protocol Decoder for TPM 2.0 & TPM 1.2 transactions from an SPI bus. BitLocker Volume Master Key (VMK) are automaticall…☆25Updated 3 years ago
 - A low pin count sniffer for ICEStick - targeting TPM chips☆168Updated 5 years ago
 - XZ backdoor reverse engineering☆98Updated last year
 - ☆11Updated 8 years ago
 - ELEGANTBOUNCER is a detection tool for file-based mobile exploits.☆156Updated last month
 - A framework for creating smart cards (ICC-based cards with contacts).☆133Updated last year
 - Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆237Updated 6 months ago
 - "Pre-Owned" malware in ROM for AllWinner H616/H618 & RockChip RK3328 Android TV Boxes☆324Updated 2 years ago
 - a low pin count sniffer for icestick☆97Updated 6 years ago
 - Secure boot objects recommended by Microsoft.☆117Updated this week
 - A Binary Ninja plugin that automatically resolves type information for EFI protocol usage.☆37Updated 3 months ago