chip-red-pill / IntelTXE-PoCView external linksLinks
Intel Management Engine JTAG Proof of Concept
☆144May 27, 2020Updated 5 years ago
Alternatives and similar repositories for IntelTXE-PoC
Users that are interested in IntelTXE-PoC are comparing it to the libraries listed below
Sorting:
- IPC scripts for access to Intel CRBUS☆121Aug 6, 2021Updated 4 years ago
- GLM uCode dumps☆295May 27, 2020Updated 5 years ago
- Intel Management Engine JTAG Proof of Concept☆536Jun 12, 2020Updated 5 years ago
- The first analysis framework for CPU microcode☆412Mar 13, 2023Updated 2 years ago
- ☆35Jun 4, 2018Updated 7 years ago
- ☆11Jun 3, 2019Updated 6 years ago
- CVE-2021-39685 Description and sample exploit for Linux USB Gadget overflow vulnerability☆14Apr 28, 2022Updated 3 years ago
- A low pin count sniffer for ICEStick - targeting TPM chips☆172Jun 8, 2020Updated 5 years ago
- Display, extract, and manipulate PSP firmware inside UEFI images☆675Jan 30, 2026Updated 2 weeks ago
- ☆48Nov 4, 2022Updated 3 years ago
- Minimal setup to trigger the xz backdoor☆29Oct 19, 2024Updated last year
- Tensilica Xtensa processor module for Ghidra☆17Sep 30, 2025Updated 4 months ago
- Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode☆355Oct 21, 2018Updated 7 years ago
- ☆21Aug 6, 2022Updated 3 years ago
- Extract bits from photos☆91Apr 30, 2020Updated 5 years ago
- ☆74Dec 27, 2017Updated 8 years ago
- ☆113Jul 16, 2023Updated 2 years ago
- ☆1,506Jul 22, 2022Updated 3 years ago
- Asagi-like Yotsuba scraper☆27Apr 1, 2025Updated 10 months ago
- A tool to perform so called BGE attack☆26Jun 13, 2025Updated 8 months ago
- Image manipulation tools for the Management Engine firmware☆44Mar 3, 2019Updated 6 years ago
- Scripts to collect microcode from CPUMicrocodes Repo and to downgrade to a compatible microcode.☆22Oct 18, 2024Updated last year
- ☆24Apr 2, 2024Updated last year
- ☆74May 30, 2023Updated 2 years ago
- ☆24Dec 11, 2022Updated 3 years ago
- TRRespass☆127May 5, 2021Updated 4 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- Read-only Slack RTM API CLI for monitoring teams☆10Mar 18, 2019Updated 6 years ago
- Replacement for Fujitsu Cortex-M3/M4 serial programming mode☆13Sep 4, 2017Updated 8 years ago
- Cross-Domain DPA Attack on SAML11☆17Jul 14, 2019Updated 6 years ago
- Docker image: DNS over HTTPS proxy☆11Jun 26, 2020Updated 5 years ago
- A hand-written recursive decent Verilog parser.☆10Jan 30, 2026Updated 2 weeks ago
- Experimental linux kernel module to mirror evdev inputs☆16Aug 1, 2020Updated 5 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆83May 13, 2019Updated 6 years ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆26Nov 19, 2023Updated 2 years ago
- The firmware, gateware, and host software of the ESP CPA Board.☆29Apr 30, 2024Updated last year
- Documentation about the reversed engineered PSP interfaces/hardware components.☆28Mar 22, 2022Updated 3 years ago
- Extract annoations from Ghidra into an X32/X64 dbg database☆57Feb 24, 2021Updated 4 years ago
- ☆74Jul 16, 2020Updated 5 years ago