chip-red-pill / udbgInstr
☆113Updated last year
Alternatives and similar repositories for udbgInstr
Users that are interested in udbgInstr are comparing it to the libraries listed below
Sorting:
- IPC scripts for access to Intel CRBUS☆118Updated 3 years ago
- Intel Management Engine JTAG Proof of Concept☆142Updated 4 years ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆81Updated 2 years ago
- The first analysis framework for CPU microcode☆392Updated 2 years ago
- A super simple RV32i JIT, designed for ease of understanding and modification☆84Updated 2 years ago
- Helper plugin for analyzing UEFI firmware☆90Updated 11 months ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- Arbitrary Speculative Code Execution with Return Instructions☆160Updated last year
- Determine which CPU architecture is used in a binary file.☆118Updated 2 months ago
- ☆74Updated 4 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆129Updated 3 years ago
- Linux i386 tool to load and execute ME modules.☆132Updated 4 years ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆68Updated last year
- EFI Byte Code Virtual Machine in userspace☆78Updated 2 years ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆33Updated 2 years ago
- Why fuzzing with emulators is amazing☆137Updated 4 years ago
- Exploration of x86-64 ISA using speculative execution.☆310Updated 4 years ago
- This is an instruction to run your own SMM code.☆104Updated 4 years ago
- A differential fuzzer for x86 decoders☆251Updated 6 months ago
- Binja loader for AMD-SP or PSP firmware binaries.☆36Updated 2 years ago
- x86 decoders for the yaxpeax project☆136Updated 10 months ago
- ☆172Updated 2 years ago
- ☆92Updated 10 months ago
- Safely execute an arbitrary x86 instruction☆180Updated last year
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆159Updated 2 years ago
- Minimal RarVM Toolchain☆233Updated 9 years ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆96Updated 8 years ago
- Intel x86 bare metal hypervisor for researching snapshot fuzzing ideas.☆166Updated 4 years ago
- ☆363Updated last year
- ☆112Updated last year