binarly-io / Vulnerability-REsearchView external linksLinks
Binarly Vulnerability Research Advisories
☆185Jan 26, 2026Updated 2 weeks ago
Alternatives and similar repositories for Vulnerability-REsearch
Users that are interested in Vulnerability-REsearch are comparing it to the libraries listed below
Sorting:
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆243Mar 12, 2024Updated last year
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆242May 2, 2025Updated 9 months ago
- ☆133Jan 25, 2026Updated 2 weeks ago
- IDA plugin and loader for UEFI firmware analysis and reverse engineering automation☆1,066Feb 2, 2026Updated last week
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆144Mar 29, 2021Updated 4 years ago
- 👓A collection of papers/tools/exploits for UEFI security.☆210Sep 4, 2025Updated 5 months ago
- BINARLY Research Tools and PoCs☆40Sep 27, 2024Updated last year
- Ghidra analyzer for UEFI firmware.☆18Jun 24, 2023Updated 2 years ago
- Checks for tpm vulnerabilities☆38Mar 16, 2023Updated 2 years ago
- ☆155May 2, 2025Updated 9 months ago
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w…☆10Jul 25, 2023Updated 2 years ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆76Oct 22, 2016Updated 9 years ago
- Materials for my DMA attacks talk and a collection of related links☆63Jun 12, 2024Updated last year
- A collection of resources and information about CVE-2023-2033☆19Aug 13, 2023Updated 2 years ago
- Simple PoC for a bootkit written as a UEFI Option ROM Driver☆11Oct 5, 2022Updated 3 years ago
- ☆12Aug 31, 2022Updated 3 years ago
- ☆23Jul 28, 2023Updated 2 years ago
- Another UEFI runtime bootkit☆36May 8, 2023Updated 2 years ago
- ☆18Jan 21, 2026Updated 3 weeks ago
- baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability☆348Sep 27, 2023Updated 2 years ago
- Static Binary Instrumentation tool for Windows x64 executables☆207Sep 29, 2025Updated 4 months ago
- Report and exploit of CVE-2024-21305.☆38Jan 14, 2024Updated 2 years ago
- An extended proof-of-concept for the CVE-2021-21551 Dell ‘dbutil_2_3.sys’ Kernel Exploit☆24Jul 20, 2021Updated 4 years ago
- PCI Express DIY hacking toolkit for Xilinx SP605. This repository is also home of Hyper-V Backdoor and Boot Backdoor, check readme for li…☆847May 20, 2024Updated last year
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆202Jul 27, 2022Updated 3 years ago
- ☆15Mar 13, 2023Updated 2 years ago
- Overview of Microsoft Patch Tuesday☆14Sep 13, 2024Updated last year
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆28Feb 15, 2022Updated 3 years ago
- Quarkslab conference talks☆313Nov 7, 2025Updated 3 months ago
- Ghidra utilities for analyzing PC firmware☆466Jan 14, 2026Updated last month
- Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate some tedious Windows Kernel Drivers reverse engineering tasks☆410Jul 4, 2025Updated 7 months ago
- Repository of vulnerabilities disclosed by ESET☆29Jul 13, 2022Updated 3 years ago
- A Binary Ninja plugin that automatically resolves type information for EFI protocol usage.☆38Jul 25, 2025Updated 6 months ago
- A fuzzer for full VM kernel/driver targets☆773Jan 6, 2026Updated last month
- Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks☆354Nov 3, 2023Updated 2 years ago
- Framework for Automating Fuzzable Target Discovery with Static Analysis.☆547Feb 1, 2024Updated 2 years ago
- UEFI and SMM Assessment Tool☆213Nov 21, 2024Updated last year
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆58Nov 16, 2021Updated 4 years ago
- ☆31Jul 21, 2020Updated 5 years ago