chip-red-pill / udbgInstrLinks
☆117Updated 2 years ago
Alternatives and similar repositories for udbgInstr
Users that are interested in udbgInstr are comparing it to the libraries listed below
Sorting:
- IPC scripts for access to Intel CRBUS☆120Updated 4 years ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆86Updated 2 years ago
- Intel Management Engine JTAG Proof of Concept☆145Updated 5 years ago
- A differential fuzzer for x86 decoders☆252Updated last year
- The first analysis framework for CPU microcode☆410Updated 2 years ago
- ☆368Updated last year
- EFI Byte Code Virtual Machine in userspace☆81Updated 2 years ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆72Updated last year
- Arbitrary Speculative Code Execution with Return Instructions☆175Updated last year
- x86 decoders for the yaxpeax project☆141Updated 2 months ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆100Updated 8 years ago
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆159Updated 3 years ago
- Exploration of x86-64 ISA using speculative execution.☆317Updated 4 years ago
- GLM uCode dumps☆294Updated 5 years ago
- Linux i386 tool to load and execute ME modules.☆136Updated 4 years ago
- Determine which CPU architecture is used in a binary file.☆125Updated 9 months ago
- X86 disassembler benchmark☆64Updated last month
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Updated 3 years ago
- PSP emulator☆93Updated 4 years ago
- Minimal RarVM Toolchain☆236Updated 10 years ago
- ☆74Updated 5 years ago
- ☆191Updated 2 months ago
- ☆112Updated 2 years ago
- ☆95Updated last year
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated 2 years ago
- Safely execute an arbitrary x86 instruction☆202Updated last year
- This is an instruction to run your own SMM code.☆109Updated 4 years ago
- Binja loader for AMD-SP or PSP firmware binaries.☆41Updated 2 years ago
- EFI DXE Emulator and Interactive Debugger☆87Updated 5 years ago
- Ghidra P-Code emulation and static LLVM lifting in Python☆37Updated 3 years ago