hardenedlinux / firmware-anatomy
Tear the firmware apart with your bare hands;-)
☆178Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for firmware-anatomy
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆92Updated 7 years ago
- ☆354Updated 2 weeks ago
- The code to the SGX-ROP paper☆183Updated 4 years ago
- Security Project☆86Updated 2 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆214Updated 2 years ago
- Debian GNU/Linux based Services Profiles☆231Updated 2 years ago
- A tool for UEFI firmware reverse engineering☆330Updated last year
- Extract BIOS firmware from Intel-based workstations and laptops☆314Updated 6 months ago
- Notes on various topics I'm interested in☆157Updated 9 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆78Updated 5 years ago
- Disabling kernel lockdown on Ubuntu without physical access☆78Updated last year
- L1TF (Foreshadow) VM guest to host memory read PoC☆112Updated 6 years ago
- TPM Genie is an I2C bus interposer for discrete Trusted Platform Modules☆212Updated 3 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for x86 (Presented at BlackHat Asia 2017/2018, beVX 2018 and HITBSecConf 2017)☆184Updated 5 years ago
- ☆34Updated last year
- Nailgun attack on ARM devices.☆155Updated 3 years ago
- ☆116Updated 3 years ago
- Linux kernel exploitation experiments☆186Updated 4 months ago
- ☆31Updated 7 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆73Updated 5 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆297Updated 5 years ago
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆153Updated 7 years ago
- Kernel Fuzzer for Xen Project (KF/x) - Hypervisor-based fuzzing using Xen VM forking, VMI & AFL☆467Updated 4 months ago
- LKRG bypass methods☆71Updated 4 years ago
- ☆70Updated 4 years ago
- Dump privileged ARM system registers from usermode using variant 3a of Meltdown☆242Updated 6 years ago
- ☆72Updated 6 years ago
- Linux i386 tool to load and execute ME modules.☆128Updated 3 years ago
- ☆179Updated 3 years ago