chip-red-pill / uCodeDisasm
☆363Updated last year
Alternatives and similar repositories for uCodeDisasm:
Users that are interested in uCodeDisasm are comparing it to the libraries listed below
- Exploration of x86-64 ISA using speculative execution.☆310Updated 3 years ago
- The first analysis framework for CPU microcode☆391Updated 2 years ago
- Ghidra analyzer for UEFI firmware.☆344Updated 10 months ago
- A differential fuzzer for x86 decoders☆249Updated 6 months ago
- GLM uCode dumps☆288Updated 4 years ago
- IPC scripts for access to Intel CRBUS☆118Updated 3 years ago
- The research UEFI hypervisor that supports booting an operating system.☆608Updated 8 months ago
- IA32-doc is a project which aims to put as many definitions from the Intel Manual into machine-processable format as possible☆594Updated 2 months ago
- Ghidra utilities for analyzing PC firmware☆423Updated 3 months ago
- Intel Management Engine JTAG Proof of Concept☆142Updated 4 years ago
- Kernel Fuzzer for Xen Project (KF/x) - Hypervisor-based fuzzing using Xen VM forking, VMI & AFL☆474Updated 9 months ago
- The fastest Intel-PT decoder for fuzzing☆370Updated last year
- A hypervisor for fuzzing built with WHVP and Bochs☆375Updated 6 years ago
- ☆113Updated last year
- Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode☆339Updated 6 years ago
- The Windows Library for Intel Process Trace (WinIPT) is a project that leverages the new Intel Processor Trace functionality exposed by W…☆380Updated last year
- High-performance QEMU memory and instruction tracing☆543Updated 8 months ago
- Arbitrary Speculative Code Execution with Return Instructions☆159Updated last year
- Lightweight type-1 hypervisor offering a foundation for building advanced security-focused functionality.☆257Updated 3 months ago
- ☆173Updated 2 years ago
- Intel Management Engine JTAG Proof of Concept☆520Updated 4 years ago
- Binary code coverage visualizer plugin for Ghidra☆290Updated 9 months ago
- bddisasm is a fast, lightweight, x86/x64 instruction decoder. The project also features a fast, basic, x86/x64 instruction emulator, des…☆950Updated 3 weeks ago
- A very simple hypervisor for learning experience.☆137Updated 3 years ago
- Visualize the virtual address space of a Windows process on a Hilbert curve.☆300Updated 4 years ago
- A tool for UEFI firmware reverse engineering☆341Updated 3 months ago
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆435Updated last year
- LibVMI-based debug server, implemented in Python. Building a guest aware, stealth and agentless full-system debugger☆217Updated 4 years ago
- Rellic produces goto-free C output from LLVM bitcode☆555Updated 7 months ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆81Updated 2 years ago