hardenedlinux / firmware-anatomy
Tear the firmware apart with your bare hands;-)
☆180Updated 3 years ago
Alternatives and similar repositories for firmware-anatomy:
Users that are interested in firmware-anatomy are comparing it to the libraries listed below
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆96Updated 7 years ago
- Intel Management Engine firmware loader plugin for IDA☆90Updated 7 years ago
- A tool for UEFI firmware reverse engineering☆340Updated last month
- Nailgun attack on ARM devices.☆161Updated 3 years ago
- Linux kernel exploitation experiments☆190Updated this week
- Security Project☆86Updated 2 years ago
- The code to the SGX-ROP paper☆183Updated 4 years ago
- ☆116Updated 4 years ago
- SALT - SLUB ALlocator Tracer for the Linux kernel☆148Updated 6 years ago
- ☆22Updated 3 years ago
- Debian GNU/Linux based Services Profiles☆232Updated 2 years ago
- ☆73Updated 6 years ago
- PC firmware exploitation tool and library☆249Updated 2 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆111Updated 6 years ago
- Kernel Fuzzer for Xen Project (KF/x) - Hypervisor-based fuzzing using Xen VM forking, VMI & AFL☆470Updated 6 months ago
- Disabling kernel lockdown on Ubuntu without physical access☆78Updated 2 years ago
- GUSTAVE is a fuzzing platform for embedded OS kernels. It is based on QEMU and AFL (and all of its forkserver siblings). It allows to fuz…☆195Updated 3 years ago
- Tools for working with Intel ME☆209Updated 7 years ago
- TPM-Fail Attack code & data☆120Updated last year
- Platform Firmware Auditing Tool☆130Updated 6 years ago
- This repository contains the tools we used in our research on the Google Titan M chip☆183Updated 2 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆214Updated 3 years ago
- ☆358Updated 2 weeks ago
- ☆34Updated 2 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆79Updated 5 years ago
- ☆217Updated last year
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆153Updated 7 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆300Updated 5 years ago
- Fuzzer for Linux Kernel Drivers☆374Updated 2 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for x86 (Presented at BlackHat Asia 2017/2018, beVX 2018 and HITBSecConf 2017)☆185Updated 5 years ago