chip-red-pill / uCodeDisasmLinks
☆368Updated last year
Alternatives and similar repositories for uCodeDisasm
Users that are interested in uCodeDisasm are comparing it to the libraries listed below
Sorting:
- Exploration of x86-64 ISA using speculative execution.☆317Updated 4 years ago
- GLM uCode dumps☆294Updated 5 years ago
- The first analysis framework for CPU microcode☆412Updated 2 years ago
- Ghidra analyzer for UEFI firmware.☆379Updated last year
- ☆117Updated 2 years ago
- Visualize the virtual address space of a Windows process on a Hilbert curve.☆305Updated 4 years ago
- A differential fuzzer for x86 decoders☆258Updated last year
- Intel Management Engine JTAG Proof of Concept☆145Updated 5 years ago
- IPC scripts for access to Intel CRBUS☆120Updated 4 years ago
- Ghidra utilities for analyzing PC firmware☆458Updated 2 weeks ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆86Updated 2 years ago
- Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode☆352Updated 7 years ago
- Linux i386 tool to load and execute ME modules.☆136Updated 4 years ago
- The research UEFI hypervisor that supports booting an operating system.☆691Updated last year
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆100Updated 8 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆175Updated last year
- A hypervisor for fuzzing built with WHVP and Bochs☆378Updated 6 years ago
- This repository contains exploit and reverse-engineering source code regarding the Spectre-BHB/Branch History Injection vulnerability☆118Updated 3 years ago
- Decompilation as a Service. Explore multiple decompilers and compare their output with minimal effort. Upload binary, get decompilation.☆458Updated 3 years ago
- Rellic produces goto-free C output from LLVM bitcode☆581Updated 2 weeks ago
- The fastest Intel-PT decoder for fuzzing☆376Updated last year
- ☆173Updated 3 years ago
- The runtime DXE driver monitoring access to the UEFI variables by hooking the runtime service table.☆145Updated 5 years ago
- Simpleator ("Simple-ator") is an innovative Windows-centric x64 user-mode application emulator that leverages several new features that w…☆378Updated 7 years ago
- bddisasm is a fast, lightweight, x86/x64 instruction decoder. The project also features a fast, basic, x86/x64 instruction emulator, des…☆999Updated last week
- A tool for UEFI firmware reverse engineering☆366Updated last year
- Intel Management Engine JTAG Proof of Concept☆533Updated 5 years ago
- High-performance QEMU memory and instruction tracing☆550Updated last year
- Kernel Fuzzer for Xen Project (KF/x) - Hypervisor-based fuzzing using Xen VM forking, VMI & AFL☆473Updated last year
- LibVMI-based debug server, implemented in Python. Building a guest aware, stealth and agentless full-system debugger☆220Updated 5 years ago