☆370Jan 18, 2024Updated 2 years ago
Alternatives and similar repositories for uCodeDisasm
Users that are interested in uCodeDisasm are comparing it to the libraries listed below
Sorting:
- GLM uCode dumps☆295May 27, 2020Updated 5 years ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆87Mar 13, 2023Updated 2 years ago
- ☆118Sep 1, 2023Updated 2 years ago
- ☆1,506Jul 22, 2022Updated 3 years ago
- The first analysis framework for CPU microcode☆412Mar 13, 2023Updated 2 years ago
- Exploration of x86-64 ISA using speculative execution.☆317Jan 8, 2026Updated last month
- Intel Management Engine JTAG Proof of Concept☆540Jun 12, 2020Updated 5 years ago
- Pentium II microcode (dis)assembler and (de)scrambler☆21Feb 11, 2021Updated 5 years ago
- VMX intrinsics plugin for Hex-Rays decompiler☆74Oct 28, 2019Updated 6 years ago
- IDA strike-out: A Hex-Rays decompiler plugin to patch the Ctree☆126Nov 27, 2025Updated 3 months ago
- IPC scripts for access to Intel CRBUS☆121Aug 6, 2021Updated 4 years ago
- Hyper-V scripts☆137Nov 22, 2025Updated 3 months ago
- IDA plugin and loader for UEFI firmware analysis and reverse engineering automation☆1,072Feb 17, 2026Updated last week
- Symbolic Execution Engine based on Ghidra's PCode☆84Mar 16, 2023Updated 2 years ago
- The research UEFI hypervisor that supports booting an operating system.☆711Aug 15, 2024Updated last year
- Fast and lightweight x86/x86-64 disassembler and code generation library☆4,083Dec 8, 2025Updated 2 months ago
- Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode☆355Oct 21, 2018Updated 7 years ago
- A differential fuzzer for x86 decoders☆262Updated this week
- A Minimalist Instruction Extender for the ARM architecture and IDA Pro☆202Aug 16, 2024Updated last year
- State-of-the-art native debugging tools☆3,639Feb 20, 2026Updated last week
- Tool for decoding mask programmed PLAs from die shots☆22Jun 16, 2020Updated 5 years ago
- ☆189Mar 21, 2025Updated 11 months ago
- wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kerne…☆1,726Jan 2, 2026Updated last month
- Safely execute an arbitrary x86 instruction☆205Feb 6, 2024Updated 2 years ago
- ☆24Aug 27, 2021Updated 4 years ago
- Virtual-machine Translation Intermediate Language☆1,462Nov 5, 2023Updated 2 years ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Sep 4, 2022Updated 3 years ago
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆127Jun 18, 2020Updated 5 years ago
- Header only wrapper around Hex-Rays API in C++20.☆168Dec 25, 2024Updated last year
- A set of tools for fuzzing SecureROM. Managed to find and trigger checkm8.☆164Sep 18, 2021Updated 4 years ago
- A Trace Explorer for Reverse Engineers☆1,520Oct 23, 2023Updated 2 years ago
- ☆192Jan 28, 2026Updated last month
- Intel Management Engine JTAG Proof of Concept☆144May 27, 2020Updated 5 years ago
- A lightweight dynamic instrumentation library☆1,308Apr 1, 2025Updated 10 months ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆144Mar 29, 2021Updated 4 years ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆73Mar 13, 2024Updated last year
- amd-nv-tool can extract and modify information from BIOS images of AMD systems☆14Jan 7, 2026Updated last month
- Open-source symbolic execution framework: https://maat.re☆648Updated this week
- Intel, AMD, VIA & Freescale Microcode Extraction Tool☆889Feb 14, 2026Updated 2 weeks ago