dcg-red-team / UEFI_SurveyorView external linksLinks
A collection of Ghidra scripts and tools to improve UEFI Binary Analysis and automation
☆12Jun 25, 2024Updated last year
Alternatives and similar repositories for UEFI_Surveyor
Users that are interested in UEFI_Surveyor are comparing it to the libraries listed below
Sorting:
- Assembly-based binary pattern search!☆15Apr 2, 2025Updated 10 months ago
- EDK II☆16Apr 30, 2024Updated last year
- A Ghidra processor module for the EFI Byte Code (EBC)☆35Jun 20, 2020Updated 5 years ago
- CVE-2017-5721 Proof-of-Concept☆17Oct 23, 2017Updated 8 years ago
- Sample firmware for UEFI-firmware parsing☆19Updated this week
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆41Nov 28, 2023Updated 2 years ago
- This repository contains Python 2.7 scripts for parsing MFS/MFSB partition and extracting contained files.☆34Dec 19, 2017Updated 8 years ago
- MFS and CFG file manipulation utility☆31Feb 14, 2020Updated 6 years ago
- The VSCode plugin of EDKII file association.☆32Aug 17, 2023Updated 2 years ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- PhishSticks: A project made for the course "Infra Project 2023" at Haaga-Helia. Creating tools for ethical pentesting by making a simul…☆10Dec 12, 2023Updated 2 years ago
- A tracing tool to analyze the I/O behavior of a program.☆12Sep 25, 2019Updated 6 years ago
- ☆45Aug 21, 2018Updated 7 years ago
- CHIP-8 emulator for UEFI☆12Jun 12, 2017Updated 8 years ago
- Automatially unzip files added to a specified directory☆13Mar 12, 2022Updated 3 years ago
- making printf work for you☆15Nov 10, 2025Updated 3 months ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Ruby, Kotlin, Groovy, Clojure, and JShell support for Ghidra scripting and interactive sessions.☆48Dec 20, 2025Updated last month
- Vulnerability management tool that provides Buildroot SBOM generation and CVE Analysis of target images.☆11Jan 2, 2026Updated last month
- Volumetric Development☆11Mar 19, 2024Updated last year
- A command line utility to convert Blu-ray SUP subtitles to SRT using AI Language Models or Tesseract.☆13Dec 27, 2024Updated last year
- Demonstrate the behavior of the tunnel cache on Windows☆11Aug 13, 2019Updated 6 years ago
- TeamsSix 的个人博客☆10Sep 6, 2025Updated 5 months ago
- MiniO verify interface sensitive information disclosure vulnerability (CVE-2023-28432)☆10Mar 24, 2023Updated 2 years ago
- ☆11Jul 11, 2023Updated 2 years ago
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- Attempt to use WFP for proxy interception☆10Jan 13, 2019Updated 7 years ago
- Overlay with VapourSynth plugins packaged for Nix☆15Jul 4, 2024Updated last year
- ☆12Jul 2, 2023Updated 2 years ago
- TLS Tracing examples using eBPF against the OpenSSL Library☆15Jun 26, 2022Updated 3 years ago
- Learn Winapi in this Repo with examples, to understand its abstraction in reverse engineering for Windows.☆11Aug 8, 2022Updated 3 years ago
- An demonic library to write PE binaries☆11Feb 12, 2024Updated 2 years ago
- Implementation of Silvio Cesare text infection technic☆10Jan 5, 2018Updated 8 years ago
- Code with Windows Hacker☆12Oct 14, 2022Updated 3 years ago
- Helm charts for deploying Malcolm☆16Jan 29, 2026Updated 2 weeks ago
- oh no oh no this is not good very bad very good☆11Mar 8, 2023Updated 2 years ago
- Sophos Central PowerShell module☆11Jul 11, 2023Updated 2 years ago
- PATRIOTIC - Pervasive Anti-Tampering and Anti-Repackaging for IoT for Integrated C-based Firmware☆10Jan 26, 2023Updated 3 years ago
- 黑客神器,谁用谁知道!☆10Jul 10, 2019Updated 6 years ago