meromwolff / Ghidra-EFI-Byte-Code-Processor
A Ghidra processor module for the EFI Byte Code (EBC)
☆31Updated 4 years ago
Alternatives and similar repositories for Ghidra-EFI-Byte-Code-Processor:
Users that are interested in Ghidra-EFI-Byte-Code-Processor are comparing it to the libraries listed below
- EFI DXE Emulator and Interactive Debugger☆83Updated 4 years ago
- ☆30Updated 2 months ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆66Updated 8 years ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Updated 2 years ago
- Helper plugin for analyzing UEFI firmware☆90Updated 10 months ago
- IDA plugin for extending UEFI reverse engineering capabilities☆59Updated 3 years ago
- EFI DXE Emulator and Interactive Debugger☆88Updated 5 years ago
- System Management RAM analysis tool☆77Updated 8 months ago
- Some scripts for IDA Pro to assist with reverse engineering EFI binaries☆74Updated 9 years ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆81Updated 2 years ago
- ☆10Updated 8 years ago
- Ghidra P-Code emulation and static LLVM lifting in Python☆31Updated 3 years ago
- ☆50Updated last year
- MFS and CFG file manipulation utility☆27Updated 5 years ago
- Use Ghidra Structs in Python☆29Updated 4 years ago
- FirmWire has replaced ShannonEE. OLD: A dynamic analysis environment for Samsung's Shannon baseband.☆40Updated 3 years ago
- Repository for officially supported Binary Ninja plugins☆49Updated last month
- A PCode Emulator for Ghidra.☆108Updated 4 years ago
- Exploit generator for Intel ME 11 buffer overflow☆32Updated 5 years ago
- QEMU enhanced with OS handlers, external plugins, and rapid analysis execution engine.☆41Updated 4 years ago
- A plugin for Binary Ninja to query the Symgrate2 database.☆13Updated 3 years ago
- NinjaDiff is a binary diffing plugin for Binary Ninja. Read more on our blog, and contribute code & improvements!☆63Updated 3 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆26Updated last year
- ☆17Updated 4 years ago
- A step towards automating the creation of Ghidra processor modules☆37Updated last week
- Some tools for reversing QDSP hexagon☆36Updated 4 years ago
- IDA Pro V850 Processor Module Extension☆33Updated 6 years ago
- Ghidra Emulates Functions☆54Updated 4 years ago
- Hexagon processor module for IDA Pro disassembler☆18Updated 2 years ago
- BIOS Guard script tool☆51Updated 4 years ago