hardenedlinux / firmware-anatomy
Tear the firmware apart with your bare hands;-)
☆188Updated 3 years ago
Alternatives and similar repositories for firmware-anatomy:
Users that are interested in firmware-anatomy are comparing it to the libraries listed below
- A tool for UEFI firmware reverse engineering☆342Updated 3 months ago
- The code to the SGX-ROP paper☆183Updated 5 years ago
- Security Project☆87Updated 2 years ago
- Intel Management Engine firmware loader plugin for IDA☆90Updated 7 years ago
- ☆117Updated 4 years ago
- Extract BIOS firmware from Intel-based workstations and laptops☆321Updated 11 months ago
- Linux kernel exploitation experiments☆201Updated 3 weeks ago
- ☆361Updated last month
- Platform Firmware Auditing Tool☆131Updated 6 years ago
- Notes on various topics I'm interested in☆158Updated 9 years ago
- Parse BIOS/Intel ME/UEFI firmware related structures: Volumes, FileSystems, Files, etc☆816Updated 6 months ago
- PC firmware exploitation tool and library☆251Updated 2 years ago
- Debian GNU/Linux based Services Profiles☆234Updated 3 years ago
- Tools for working with Intel ME☆212Updated 8 years ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆96Updated 7 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆302Updated 6 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for x86 (Presented at BlackHat Asia 2017/2018, beVX 2018 and HITBSecConf 2017)☆185Updated 5 years ago
- Nailgun attack on ARM devices.☆162Updated 3 years ago
- Ghidra utilities for analyzing PC firmware☆418Updated 2 months ago
- TPM-Fail Attack code & data☆120Updated last year
- Linux Kernel Source Tree Reducer☆80Updated 5 months ago
- ☆70Updated 4 years ago
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆155Updated 7 years ago
- ☆34Updated 2 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆79Updated 5 years ago
- Tools to help with Reverse Engineering UEFI-based firmware☆379Updated 9 years ago
- CHIPSEC module that exploits UEFI boot script table vulnerability☆133Updated 9 years ago
- Kernel Fuzzer for Xen Project (KF/x) - Hypervisor-based fuzzing using Xen VM forking, VMI & AFL☆472Updated 9 months ago
- ☆183Updated 4 years ago
- ☆73Updated 6 years ago