flowyroll / IntelMCDowngrade
Scripts to collect microcode from CPUMicrocodes Repo and to downgrade to a compatible microcode.
☆19Updated 11 months ago
Related projects: ⓘ
- ☆19Updated 3 years ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Updated 2 years ago
- A Ghidra processor module for the EFI Byte Code (EBC)☆29Updated 4 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆24Updated last year
- ☆9Updated 2 years ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆77Updated last year
- [CVE-2019-14615] iGPU Leak: An Information Leakage Vulnerability on Intel Integrated GPU☆54Updated 4 years ago
- ☆27Updated 2 years ago
- Helper plugin for analyzing UEFI firmware☆87Updated 3 months ago
- ☆32Updated 3 years ago
- Exploit generator for Intel ME 11 buffer overflow☆32Updated 4 years ago
- Automated recovery of Linux kernel build configurations☆23Updated 2 years ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆61Updated 7 years ago
- Toshiba MeP-c4 for Ghidra☆22Updated 5 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 4 years ago
- iTLB multihit PoC☆39Updated 10 months ago
- BIOS Guard script tool☆51Updated 3 years ago
- Python interface for Binexport, the Bindiff export format☆14Updated 2 months ago
- Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks☆28Updated 3 years ago
- MFS and CFG file manipulation utility☆26Updated 4 years ago
- Convert a raw firmware image to an ELF file.☆14Updated 5 years ago
- Slides from Public Talks☆18Updated 3 years ago
- Working Set Page Cache side-channel IPC PoC☆66Updated 5 years ago
- Thunderclap QEMU-based network card emulation☆25Updated last year
- ☆49Updated 9 months ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 2 years ago
- CVE-2021-39685 Description and sample exploit for Linux USB Gadget overflow vulnerability☆11Updated 2 years ago
- ☆21Updated 7 years ago
- A tool to perform so called BGE attack☆20Updated 5 months ago
- Research tools developed for Intel Wi-Fi chips☆48Updated 8 months ago