chip-red-pill / udbgInstr
☆114Updated last year
Alternatives and similar repositories for udbgInstr:
Users that are interested in udbgInstr are comparing it to the libraries listed below
- IPC scripts for access to Intel CRBUS☆118Updated 3 years ago
- Linux i386 tool to load and execute ME modules.☆130Updated 4 years ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆79Updated 2 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆157Updated last year
- The first analysis framework for CPU microcode☆390Updated 2 years ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆65Updated last year
- EFI Byte Code Virtual Machine in userspace☆77Updated 2 years ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Updated 2 years ago
- PSP emulator☆87Updated 3 years ago
- Helper plugin for analyzing UEFI firmware☆90Updated 9 months ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- A differential fuzzer for x86 decoders☆244Updated 4 months ago
- Intel Management Engine JTAG Proof of Concept☆141Updated 4 years ago
- ☆74Updated 4 years ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆96Updated 7 years ago
- 64bit bare metal hypervisor built from scratch with Intel VT-x☆91Updated 4 years ago
- This is an instruction to run your own SMM code.☆101Updated 4 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆129Updated 3 years ago
- Docs and resources on CPU Speculative Execution bugs☆373Updated 7 years ago
- X86 disassembler benchmark☆60Updated 8 months ago
- The sample DXE runtime driver demonstrating how to program DMA remapping.☆58Updated last year
- x86 decoders for the yaxpeax project☆135Updated 8 months ago
- Exploration of x86-64 ISA using speculative execution.☆308Updated 3 years ago
- Determine which CPU architecture is used in a binary file.☆115Updated last week
- A super simple RV32i JIT, designed for ease of understanding and modification☆84Updated 2 years ago
- Safely execute an arbitrary x86 instruction☆180Updated last year
- A simple hypervisor demonstrating the use of the Intel VT-rp (redirect protection) technology.☆101Updated 11 months ago
- System Management RAM analysis tool☆76Updated 7 months ago
- Lightweight web-based CPUID decoder and visualiser.☆89Updated this week
- ☆357Updated last year