hardenedvault / vaultbootLinks
Security payload for next-Gen firmware architecture
☆54Updated 4 months ago
Alternatives and similar repositories for vaultboot
Users that are interested in vaultboot are comparing it to the libraries listed below
Sorting:
- Helper plugin for analyzing UEFI firmware☆90Updated last year
- Two stage x86 boot loader and preliminary kernel code which are combined into single binary file to be flashed to PCI expansion card with…☆35Updated 8 years ago
- Scripts to collect microcode from CPUMicrocodes Repo and to downgrade to a compatible microcode.☆20Updated 10 months ago
- Research tools developed for Intel Wi-Fi chips☆56Updated 3 months ago
- ☆187Updated 2 months ago
- FPGA glitcher based on toothlessco's arty-glitcher, but for the icebreaker☆18Updated 5 years ago
- Intel Management Engine JTAG Proof of Concept☆144Updated 5 years ago
- ugly code to check linux kernel memory and dump some internal structures☆47Updated 9 months ago
- iTLB multihit PoC☆42Updated last year
- Thunderclap hardware for Intel Arria 10 FPGA☆32Updated 6 years ago
- ☆114Updated 2 years ago
- Exploit generator for Intel ME 11 buffer overflow☆34Updated 5 years ago
- decode bits into bytes☆46Updated 5 years ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆33Updated 3 years ago
- Thunderclap QEMU-based network card emulation☆27Updated 2 years ago
- MFS and CFG file manipulation utility☆30Updated 5 years ago
- ☆10Updated 8 years ago
- ☆45Updated 7 years ago
- An open source implementation of an AMD-V Secure Loader.☆26Updated 3 years ago
- Mimojas Firmware Toolkit for unpacking and analysis firmware images☆14Updated 5 years ago
- Image manipulation tools for the Management Engine firmware☆41Updated 6 years ago
- Converged Security Suite for Intel & AMD platform security features☆65Updated 2 weeks ago
- ☆112Updated 2 years ago
- A Ghidra processor module for the EFI Byte Code (EBC)☆32Updated 5 years ago
- ☆32Updated 8 years ago
- ☆74Updated 7 years ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆97Updated 8 years ago
- ☆32Updated 6 years ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆112Updated 2 years ago
- ☆35Updated 2 years ago