chip-red-pill / udbgInstrLinks
☆113Updated last year
Alternatives and similar repositories for udbgInstr
Users that are interested in udbgInstr are comparing it to the libraries listed below
Sorting:
- IPC scripts for access to Intel CRBUS☆119Updated 3 years ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆82Updated 2 years ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆70Updated last year
- A differential fuzzer for x86 decoders☆251Updated 8 months ago
- Intel Management Engine JTAG Proof of Concept☆141Updated 5 years ago
- Helper plugin for analyzing UEFI firmware☆90Updated last year
- Arbitrary Speculative Code Execution with Return Instructions☆162Updated last year
- This is an instruction to run your own SMM code.☆105Updated 4 years ago
- Binja loader for AMD-SP or PSP firmware binaries.☆36Updated 2 years ago
- EFI Byte Code Virtual Machine in userspace☆79Updated 2 years ago
- ☆74Updated 4 years ago
- Determine which CPU architecture is used in a binary file.☆119Updated 3 months ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆33Updated 2 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆129Updated 3 years ago
- The first analysis framework for CPU microcode☆394Updated 2 years ago
- ☆112Updated last year
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- A super simple RV32i JIT, designed for ease of understanding and modification☆85Updated 2 years ago
- x86 decoders for the yaxpeax project☆137Updated 3 weeks ago
- Linux i386 tool to load and execute ME modules.☆133Updated 4 years ago
- X86 disassembler benchmark☆60Updated 11 months ago
- ☆363Updated last year
- Why fuzzing with emulators is amazing☆138Updated 4 years ago
- Intel x86 bare metal hypervisor for researching snapshot fuzzing ideas.☆167Updated 4 years ago
- ☆172Updated 3 years ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆142Updated 4 years ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆97Updated 8 years ago
- The sample DXE runtime driver demonstrating how to program DMA remapping.☆59Updated last year
- libLISA: Instruction Discovery and Analysis on x86-64☆114Updated 4 months ago
- ☆178Updated last week