chip-red-pill / uCodeDisasmLinks
☆363Updated last year
Alternatives and similar repositories for uCodeDisasm
Users that are interested in uCodeDisasm are comparing it to the libraries listed below
Sorting:
- Exploration of x86-64 ISA using speculative execution.☆314Updated 4 years ago
- The first analysis framework for CPU microcode☆396Updated 2 years ago
- GLM uCode dumps☆289Updated 5 years ago
- ☆113Updated last year
- Ghidra analyzer for UEFI firmware.☆355Updated last year
- A differential fuzzer for x86 decoders☆251Updated 9 months ago
- IPC scripts for access to Intel CRBUS☆120Updated 4 years ago
- Visualize the virtual address space of a Windows process on a Hilbert curve.☆301Updated 4 years ago
- Intel Management Engine JTAG Proof of Concept☆142Updated 5 years ago
- The research UEFI hypervisor that supports booting an operating system.☆650Updated 11 months ago
- Linux i386 tool to load and execute ME modules.☆134Updated 4 years ago
- A tool for UEFI firmware reverse engineering☆351Updated 7 months ago
- Ghidra utilities for analyzing PC firmware☆441Updated 6 months ago
- Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode☆343Updated 6 years ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆82Updated 2 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆160Updated last year
- ☆172Updated 3 years ago
- Simpleator ("Simple-ator") is an innovative Windows-centric x64 user-mode application emulator that leverages several new features that w…☆372Updated 6 years ago
- A very simple hypervisor for learning experience.☆139Updated 3 years ago
- Kernel Fuzzer for Xen Project (KF/x) - Hypervisor-based fuzzing using Xen VM forking, VMI & AFL☆473Updated last year
- A hypervisor for fuzzing built with WHVP and Bochs☆378Updated 6 years ago
- Kernel-based debugger for Linux applications☆75Updated 3 years ago
- The Windows Library for Intel Process Trace (WinIPT) is a project that leverages the new Intel Processor Trace functionality exposed by W…☆395Updated 2 years ago
- An analysis of the Warbird virtual-machine protection for the CI!g_pStore☆252Updated 7 years ago
- The runtime DXE driver monitoring access to the UEFI variables by hooking the runtime service table.☆145Updated 4 years ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆97Updated 8 years ago
- IA32-doc is a project which aims to put as many definitions from the Intel Manual into machine-processable format as possible☆634Updated 6 months ago
- Intel Management Engine JTAG Proof of Concept☆520Updated 5 years ago
- This repository contains exploit and reverse-engineering source code regarding the Spectre-BHB/Branch History Injection vulnerability☆117Updated 3 years ago
- This is an instruction to run your own SMM code.☆108Updated 4 years ago