chip-red-pill / glm-ucode
GLM uCode dumps
☆278Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for glm-ucode
- IPC scripts for access to Intel CRBUS☆118Updated 3 years ago
- Intel Management Engine JTAG Proof of Concept☆140Updated 4 years ago
- Intel Management Engine JTAG Proof of Concept☆510Updated 4 years ago
- Linux i386 tool to load and execute ME modules.☆128Updated 3 years ago
- Ghidra analyzer for UEFI firmware.☆316Updated 5 months ago
- Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode☆326Updated 6 years ago
- ☆352Updated 10 months ago
- Exploration of x86-64 ISA using speculative execution.☆305Updated 3 years ago
- Ghidra utilities for analyzing PC firmware☆400Updated 7 months ago
- Tools to help with Reverse Engineering UEFI-based firmware☆371Updated 8 years ago
- ☆171Updated 2 years ago
- Tools for working with Intel ME☆206Updated 7 years ago
- The first analysis framework for CPU microcode☆373Updated last year
- Display, extract, and manipulate PSP firmware inside UEFI images☆612Updated this week
- A differential fuzzer for x86 decoders☆234Updated last month
- Some scripts for IDA Pro to assist with reverse engineering EFI binaries☆287Updated 5 years ago
- Tool for decrypting the firmware files for Samsung SSDs☆211Updated 3 years ago
- ☆109Updated last year
- TRRespass☆120Updated 3 years ago
- TPM Genie is an I2C bus interposer for discrete Trusted Platform Modules☆212Updated 3 years ago
- PC firmware exploitation tool and library☆246Updated 2 years ago
- Intel ME Manufacturing Mode Detection Tools☆125Updated 6 years ago
- LibVMI-based debug server, implemented in Python. Building a guest aware, stealth and agentless full-system debugger☆216Updated 4 years ago
- Scout - Instruction based research debugger (a poor man's debugger)☆150Updated last year
- This repository contains the tools we used in our research on the Google Titan M chip☆181Updated 2 years ago
- A hypervisor for fuzzing built with WHVP and Bochs☆367Updated 5 years ago
- Recognize cpu instructions in an arbitrary binary file☆655Updated 8 months ago
- Docs and resources on CPU Speculative Execution bugs☆372Updated 6 years ago
- My UEFI security talk on ZeroNights 2015☆57Updated 8 years ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆92Updated 7 years ago