flothrone / bootguardLinks
☆118Updated 4 years ago
Alternatives and similar repositories for bootguard
Users that are interested in bootguard are comparing it to the libraries listed below
Sorting:
- Intel Management Engine firmware loader plugin for IDA☆92Updated 7 years ago
- Betraying the BIOS: Where the Guardians of the BIOS are Failing☆59Updated 7 years ago
- CHIPSEC module that exploits UEFI boot script table vulnerability☆134Updated 9 years ago
- My UEFI security talk on ZeroNights 2015☆57Updated 9 years ago
- An EFI image parser and dissector☆50Updated 12 years ago
- PC firmware exploitation tool and library☆254Updated 3 years ago
- System Management RAM analysis tool☆78Updated 9 months ago
- ☆73Updated 7 years ago
- Huffman decompression for version 11.x Intel ME modules☆30Updated 7 years ago
- ☆45Updated 6 years ago
- Tools to help with Reverse Engineering UEFI-based firmware☆382Updated 9 years ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆66Updated 8 years ago
- PEI stage backdoor for UEFI compatible firmware☆221Updated 4 years ago
- A TE executable format loader for IDA☆28Updated 9 years ago
- Crawl/download UEFI/BIOS updates from ISV/OEM distributors.☆73Updated 11 years ago
- Some scripts for IDA Pro to assist with reverse engineering EFI binaries☆75Updated 9 years ago
- JEFF file format tools☆27Updated 9 years ago
- Tools for working with Intel ME☆214Updated 8 years ago
- Some scripts for IDA Pro to assist with reverse engineering EFI binaries☆298Updated 6 years ago
- This repository contains Python 2.7 scripts for parsing MFS/MFSB partition and extracting contained files.☆32Updated 7 years ago
- An IDA plugin to improve (U)EFI reversing☆151Updated 7 years ago
- Image manipulation tools for the Management Engine firmware☆36Updated 6 years ago
- ☆70Updated 5 years ago
- Deobfuscation utilities for HDD/SSD firmware images☆76Updated 6 years ago
- Firmware analysis gone wild.☆42Updated 10 years ago
- an open source toolkit for PCI bus exploration☆71Updated 8 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 8 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 8 years ago
- Primitive TE to PE32 converter☆33Updated 3 months ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆27Updated 9 years ago