binarly-io / SupplyChainAttacksLinks
☆271Updated 5 months ago
Alternatives and similar repositories for SupplyChainAttacks
Users that are interested in SupplyChainAttacks are comparing it to the libraries listed below
Sorting:
- A list of public attacks on BitLocker☆319Updated 3 weeks ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆112Updated 2 years ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆307Updated 3 years ago
- UEFI and SMM Assessment Tool☆199Updated 9 months ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆239Updated last year
- A Saleae Analyzer for TPM traffic that only requires the LADD & LFRAME signals, no clock.☆140Updated last year
- baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability☆340Updated last year
- Memory-Dump-UEFI is a UEFI application for dumping the contents of RAM.☆175Updated 5 months ago
- A repo for TPM sniffing greatness☆234Updated 2 months ago
- ☆326Updated 2 years ago
- Damn Vulnerable UEFI☆287Updated 11 months ago
- Ghidra analyzer for UEFI firmware.☆359Updated last year
- 🍞 BREAD: BIOS Reverse Engineering & Advanced Debugger☆313Updated last year
- libsigrok stacked Protocol Decoder for TPM 2.0 & TPM 1.2 transactions from an SPI bus. BitLocker Volume Master Key (VMK) are automaticall…☆25Updated 3 years ago
- Intel Management Engine JTAG Proof of Concept☆143Updated 5 years ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆29Updated 2 months ago
- Firmware Analysis Tool☆170Updated 9 months ago
- Bootkit sample for firmware attack☆257Updated 8 months ago
- A tool to explore USB-C on Apple devices using the Tamarin C Hardware.☆217Updated last year
- A low pin count sniffer for ICEStick - targeting TPM chips☆167Updated 5 years ago
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆58Updated last year
- a low pin count sniffer for icestick☆95Updated 6 years ago
- Minimal setup to trigger the xz backdoor☆28Updated 10 months ago
- random dissectors☆67Updated 2 years ago
- A framework for creating smart cards (ICC-based cards with contacts).☆133Updated last year
- The first analysis framework for CPU microcode☆397Updated 2 years ago
- "Pre-Owned" malware in ROM for AllWinner H616/H618 & RockChip RK3328 Android TV Boxes☆322Updated 2 years ago
- XZ backdoor reverse engineering☆98Updated last year
- A collection of Ghidra scripts, including the GPT-3 powered code analyser and annotator, G-3PO.☆312Updated 2 years ago
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆234Updated 3 months ago