kkamagui / napper-for-tpmLinks
TPM vulnerability checking tool for CVE-2018-6622. This tool will be published at Black Hat Asia 2019 and Black Hat Europe 2019
☆103Updated 2 years ago
Alternatives and similar repositories for napper-for-tpm
Users that are interested in napper-for-tpm are comparing it to the libraries listed below
Sorting:
- This tool can decrypt a BitLocker-locked partition with the TPM vulnerability☆205Updated 2 years ago
- Intel Management Engine firmware loader plugin for IDA☆92Updated 7 years ago
- Make ARM Shellcode Great Again☆62Updated 4 years ago
- TPM-Fail Attack code & data☆122Updated 2 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆111Updated 6 years ago
- Helper plugin for analyzing UEFI firmware☆90Updated last year
- PC firmware exploitation tool and library☆254Updated 3 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- Research material and Proof-of-Concepts for Aleph Research Findings☆89Updated 3 years ago
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆13Updated 4 years ago
- ☆74Updated 7 years ago
- X41 Smartcard Fuzzer☆117Updated 6 years ago
- This repository contains the tools we used in our research on the Google Titan M chip☆188Updated 2 years ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆97Updated 8 years ago
- ☆91Updated 5 years ago
- Tear the firmware apart with your bare hands;-)☆190Updated 3 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated 10 months ago
- A low pin count sniffer for ICEStick - targeting TPM chips☆165Updated 5 years ago
- CHIPSEC module that exploits UEFI boot script table vulnerability☆135Updated 9 years ago
- The code to the SGX-ROP paper☆184Updated 5 years ago
- Tools and scripts for firmware reverse engeneering☆48Updated 4 years ago
- ☆118Updated 4 years ago
- For code snippets and information☆41Updated 6 years ago
- ☆66Updated 6 years ago
- Tool for decrypting the firmware files for Samsung SSDs☆220Updated 4 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆150Updated 5 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for ARM (Presented at BlackHat Asia 2018)☆73Updated 7 years ago
- BootStomp: a bootloader vulnerability finder☆401Updated 3 years ago
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆48Updated 2 months ago