hacking-support / DVUEFILinks
Damn Vulnerable UEFI
☆292Updated last year
Alternatives and similar repositories for DVUEFI
Users that are interested in DVUEFI are comparing it to the libraries listed below
Sorting:
- ☆425Updated 10 months ago
- VSS Hardware Hacking Wiki and Blog Entries☆253Updated last year
- Code Coverage Exploration Plugin for Ghidra☆359Updated last year
- easylkb - Easy Linux Kernel Builder☆357Updated last year
- UEFI and SMM Assessment Tool☆203Updated 10 months ago
- A Pythonic Ghidra standard library☆173Updated 5 months ago
- Workshop on firmware reverse engineering☆279Updated 2 weeks ago
- The first analysis framework for CPU microcode☆401Updated 2 years ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆164Updated 10 months ago
- An LLM extension for Ghidra to enable AI assistance in RE.☆312Updated last week
- A custom ELF linker/loader for installing ET_REL binary patches at runtime☆170Updated last week
- WMI virus, because funny☆293Updated 8 months ago
- A list of public attacks on BitLocker☆345Updated 2 months ago
- A multi-arch assembly REPL and emulator for your command line.☆308Updated 10 months ago
- A collection of Ghidra scripts, including the GPT-3 powered code analyser and annotator, G-3PO.☆308Updated 2 years ago
- Binary Golf Grand Prix☆62Updated 6 months ago
- Bootkit sample for firmware attack☆259Updated 10 months ago
- Binary Golf Examples and Resources☆256Updated last year
- Python Command-Line Ghidra Binary Diffing Engine☆686Updated 2 weeks ago
- A C++ tool to unstrip Rust/Go binaries (ELF and PE)☆394Updated 8 months ago
- 🍞 BREAD: BIOS Reverse Engineering & Advanced Debugger☆315Updated last year
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆115Updated 3 months ago
- io_uring based rootkit☆238Updated 5 months ago
- A bare minimum hypervisor on AMD and Intel processors for learners.☆300Updated last week
- ☆636Updated 6 months ago
- Binary Golf Grand Prix☆113Updated last year
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆113Updated 2 years ago
- Binary Exploitation Phrack CTF Challenge☆133Updated last month
- ☆89Updated 7 months ago
- Determine which CPU architecture is used in a binary file.☆122Updated 7 months ago