chip-red-pill / udbgInstrLinks
☆114Updated 2 years ago
Alternatives and similar repositories for udbgInstr
Users that are interested in udbgInstr are comparing it to the libraries listed below
Sorting:
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆82Updated 2 years ago
- IPC scripts for access to Intel CRBUS☆120Updated 4 years ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆33Updated 3 years ago
- EFI Byte Code Virtual Machine in userspace☆80Updated 2 years ago
- ☆365Updated last year
- A differential fuzzer for x86 decoders☆251Updated 10 months ago
- Intel Management Engine JTAG Proof of Concept☆144Updated 5 years ago
- The first analysis framework for CPU microcode☆398Updated 2 years ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆69Updated last year
- Arbitrary Speculative Code Execution with Return Instructions☆169Updated last year
- X86 disassembler benchmark☆61Updated last year
- Determine which CPU architecture is used in a binary file.☆121Updated 6 months ago
- ☆112Updated 2 years ago
- x86 decoders for the yaxpeax project☆139Updated 3 months ago
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆162Updated 3 years ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆97Updated 8 years ago
- GLM uCode dumps☆290Updated 5 years ago
- ☆74Updated 5 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- Helper plugin for analyzing UEFI firmware☆90Updated last year
- PSP emulator☆91Updated 4 years ago
- Linux i386 tool to load and execute ME modules.☆134Updated 4 years ago
- ☆95Updated last year
- EFI DXE Emulator and Interactive Debugger☆85Updated 5 years ago
- Extracting high level semantic information from binary code☆66Updated 6 years ago
- Safely execute an arbitrary x86 instruction☆185Updated last year
- A super simple RV32i JIT, designed for ease of understanding and modification☆86Updated 2 years ago
- Binja loader for AMD-SP or PSP firmware binaries.☆37Updated 2 years ago
- Ghidra P-Code emulation and static LLVM lifting in Python☆33Updated 3 years ago
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆143Updated 4 years ago