hardenedlinux / firmware-anatomyLinks
Tear the firmware apart with your bare hands;-)
☆192Updated 2 months ago
Alternatives and similar repositories for firmware-anatomy
Users that are interested in firmware-anatomy are comparing it to the libraries listed below
Sorting:
- Nailgun attack on ARM devices.☆167Updated 4 years ago
- TPM-Fail Attack code & data☆122Updated 2 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆113Updated 6 years ago
- Intel Management Engine firmware loader plugin for IDA☆93Updated 8 years ago
- ☆35Updated 2 years ago
- The code to the SGX-ROP paper☆184Updated 5 years ago
- Intel ME Manufacturing Mode Detection Tools☆127Updated 6 years ago
- Extract BIOS firmware from Intel-based workstations and laptops☆338Updated last year
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆80Updated 6 years ago
- ☆370Updated 7 months ago
- Shadow-Box: Lightweight and Practical Kernel Protector for x86 (Presented at BlackHat Asia 2017/2018, beVX 2018 and HITBSecConf 2017)☆187Updated 6 years ago
- Debian GNU/Linux based Services Profiles☆242Updated 3 years ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆98Updated 8 years ago
- Disabling kernel lockdown on Ubuntu without physical access☆80Updated 2 years ago
- A tool for UEFI firmware reverse engineering☆357Updated 9 months ago
- ☆118Updated 4 years ago
- Security Project☆96Updated last week
- PC firmware exploitation tool and library☆257Updated 3 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆221Updated 3 years ago
- ☆77Updated 7 years ago
- Platform Firmware Auditing Tool☆131Updated 7 years ago
- Notes on various topics I'm interested in☆160Updated 10 years ago
- My presentations and papers☆47Updated 4 years ago
- This repository contains the tools we used in our research on the Google Titan M chip☆195Updated 3 years ago
- TRRespass☆125Updated 4 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆75Updated 5 years ago
- IPC scripts for access to Intel CRBUS☆120Updated 4 years ago
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆157Updated 8 years ago
- Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic☆88Updated 3 years ago
- ☆74Updated 7 years ago