chip-red-pill / udbgInstr
☆113Updated last year
Alternatives and similar repositories for udbgInstr:
Users that are interested in udbgInstr are comparing it to the libraries listed below
- IPC scripts for access to Intel CRBUS☆118Updated 3 years ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆79Updated last year
- A differential fuzzer for x86 decoders☆243Updated 3 months ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆65Updated 11 months ago
- Arbitrary Speculative Code Execution with Return Instructions☆157Updated last year
- This is an instruction to run your own SMM code.☆101Updated 3 years ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Updated 2 years ago
- The first analysis framework for CPU microcode☆376Updated last year
- Helper plugin for analyzing UEFI firmware☆90Updated 8 months ago
- x86 decoders for the yaxpeax project☆135Updated 7 months ago
- ☆74Updated 4 years ago
- A super simple RV32i JIT, designed for ease of understanding and modification☆84Updated 2 years ago
- EFI Byte Code Virtual Machine in userspace☆77Updated 2 years ago
- ☆355Updated last year
- A simple Aarch64 hypervisor for Raspberry Pi☆34Updated 4 years ago
- Determine which CPU architecture is used in a binary file.☆115Updated 11 months ago
- X86 disassembler benchmark☆57Updated 7 months ago
- Linux i386 tool to load and execute ME modules.☆130Updated 3 years ago
- ☆173Updated 2 years ago
- ☆14Updated last year
- Rewriting functions in compiled binaries using McSema☆88Updated 5 years ago
- Intel x86 bare metal hypervisor for researching snapshot fuzzing ideas.☆166Updated 4 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆129Updated 3 years ago
- Intel Management Engine JTAG Proof of Concept☆141Updated 4 years ago
- This repository contains exploit and reverse-engineering source code regarding the Spectre-BHB/Branch History Injection vulnerability☆113Updated 2 years ago
- PageBuster - dump all executable pages of packed processes.☆202Updated 3 years ago
- HelloAmdHvPkg is a type-1 research hypervisor for AMD processors.☆87Updated 4 years ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆97Updated 7 years ago
- Exploration of x86-64 ISA using speculative execution.☆307Updated 3 years ago