binarly-io / SupplyChainAttacksLinks
☆271Updated 3 months ago
Alternatives and similar repositories for SupplyChainAttacks
Users that are interested in SupplyChainAttacks are comparing it to the libraries listed below
Sorting:
- A list of public attacks on BitLocker☆313Updated 5 months ago
- UEFI and SMM Assessment Tool☆192Updated 7 months ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆109Updated 2 years ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆237Updated last year
- A Saleae Analyzer for TPM traffic that only requires the LADD & LFRAME signals, no clock.☆138Updated last year
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆304Updated 3 years ago
- Damn Vulnerable UEFI☆284Updated 10 months ago
- ☆325Updated last year
- baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability☆333Updated last year
- Memory-Dump-UEFI is a UEFI application for dumping the contents of RAM.☆160Updated 3 months ago
- A repo for TPM sniffing greatness☆231Updated 2 weeks ago
- Ghidra analyzer for UEFI firmware.☆351Updated last year
- Intel Management Engine JTAG Proof of Concept☆142Updated 5 years ago
- A low pin count sniffer for ICEStick - targeting TPM chips☆165Updated 5 years ago
- 🍞 BREAD: BIOS Reverse Engineering & Advanced Debugger☆311Updated last year
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆231Updated 2 months ago
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆58Updated last year
- XZ backdoor reverse engineering☆96Updated 11 months ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
- Bootkit sample for firmware attack☆257Updated 7 months ago
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆135Updated last year
- User-friendly Lightweight TPM Remote Attestation over Bluetooth☆170Updated 2 years ago
- Firmware Analysis Tool☆170Updated 8 months ago
- The first analysis framework for CPU microcode☆394Updated 2 years ago
- A collection of Ghidra scripts, including the GPT-3 powered code analyser and annotator, G-3PO.☆312Updated 2 years ago
- ☆128Updated 2 years ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆29Updated last month
- The xx file format. Turn your hex dumps into art, then into binary data.☆344Updated 2 years ago
- Unofficial and insecure Signal app, used by senior Trump officials like Mike Waltz, downloaded from the official TeleMessage website☆182Updated 2 months ago
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆174Updated 2 years ago