meromwolff / Ghidra-EFI-Byte-Code-Processor
A Ghidra processor module for the EFI Byte Code (EBC)
☆30Updated 4 years ago
Alternatives and similar repositories for Ghidra-EFI-Byte-Code-Processor:
Users that are interested in Ghidra-EFI-Byte-Code-Processor are comparing it to the libraries listed below
- EFI DXE Emulator and Interactive Debugger☆82Updated 4 years ago
- EFI DXE Emulator and Interactive Debugger☆89Updated 4 years ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆64Updated 8 years ago
- ☆10Updated 7 years ago
- Some scripts for IDA Pro to assist with reverse engineering EFI binaries☆73Updated 9 years ago
- ☆50Updated last year
- IDA plugin for extending UEFI reverse engineering capabilities☆58Updated 3 years ago
- Repository for officially supported Binary Ninja plugins☆49Updated 3 weeks ago
- MFS and CFG file manipulation utility☆27Updated 4 years ago
- Helper plugin for analyzing UEFI firmware☆90Updated 7 months ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆80Updated last year
- Exploit generator for Intel ME 11 buffer overflow☆32Updated 5 years ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Updated 2 years ago
- System Management RAM analysis tool☆74Updated 5 months ago
- Python module for platform, iospace and physmem inspection☆23Updated 4 years ago
- Hexagon processor module for IDA Pro disassembler☆16Updated 2 years ago
- A PCode Emulator for Ghidra.☆107Updated 3 years ago
- QEMU with support for QDSP6 user mode emulation☆32Updated 5 years ago
- Making Type Info Library (TIL) file for Apache modules☆54Updated 3 years ago
- Image manipulation tools for the Management Engine firmware☆34Updated 5 years ago
- Ghidra P-Code emulation and static LLVM lifting in Python☆30Updated 2 years ago
- IDA Pro V850 Processor Module Extension☆33Updated 6 years ago
- ☆30Updated 2 months ago
- ☆16Updated 4 years ago
- Use Ghidra Structs in Python☆28Updated 3 years ago
- ML-based ISA detection (architecture and endianness of binary code/sequences)☆64Updated last year
- Hexagon decompiler for Ghidra☆45Updated 2 years ago
- This is an instruction to run your own SMM code.☆100Updated 3 years ago
- ☆21Updated 3 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆25Updated last year