binarly-io / SupplyChainAttacks
☆268Updated last week
Alternatives and similar repositories for SupplyChainAttacks:
Users that are interested in SupplyChainAttacks are comparing it to the libraries listed below
- A list of public attacks on BitLocker☆274Updated last month
- UEFI and SMM Assessment Tool☆185Updated 4 months ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆105Updated last year
- A Saleae Analyzer for TPM traffic that only requires the LADD & LFRAME signals, no clock.☆137Updated last year
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆297Updated 3 years ago
- Damn Vulnerable UEFI☆275Updated 6 months ago
- Memory-Dump-UEFI is a UEFI application for dumping the contents of RAM.☆147Updated last week
- baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability☆318Updated last year
- A simple, very experimental TPM sniffer for LPC bus☆590Updated 11 months ago
- A repo for TPM sniffing greatness☆222Updated 3 months ago
- Ghidra analyzer for UEFI firmware.☆342Updated 10 months ago
- ☆322Updated last year
- A low pin count sniffer for ICEStick - targeting TPM chips☆164Updated 4 years ago
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆227Updated 3 months ago
- 🍞 BREAD: BIOS Reverse Engineering & Advanced Debugger☆304Updated last year
- XZ backdoor reverse engineering☆92Updated 8 months ago
- Bootkit sample for firmware attack☆246Updated 4 months ago
- A tool to explore USB-C on Apple devices using the Tamarin C Hardware.☆202Updated last year
- DBXUpdate files from Microsoft☆21Updated 2 months ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆231Updated last year
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆27Updated 3 weeks ago
- Paused mirror. Official repository at https://git.glasklar.is/system-transparency/core/stboot☆111Updated last year
- A collection of Ghidra scripts, including the GPT-3 powered code analyser and annotator, G-3PO.☆308Updated last year
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆473Updated last year
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆58Updated 9 months ago
- Binarly Vulnerability Research Advisories☆171Updated this week
- Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks☆308Updated last year
- Intel Management Engine JTAG Proof of Concept☆142Updated 4 years ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated last year
- WMI virus, because funny☆273Updated 2 months ago