pietroborrello / CustomProcessingUnitLinks
The first analysis framework for CPU microcode
☆403Updated 2 years ago
Alternatives and similar repositories for CustomProcessingUnit
Users that are interested in CustomProcessingUnit are comparing it to the libraries listed below
Sorting:
- ☆424Updated 11 months ago
- Arbitrary Speculative Code Execution with Return Instructions☆172Updated last year
- Exploration of x86-64 ISA using speculative execution.☆317Updated 4 years ago
- ☆367Updated last year
- ☆115Updated 2 years ago
- High-performance QEMU memory and instruction tracing☆547Updated last year
- Ghidra analyzer for UEFI firmware.☆372Updated last year
- UEFI and SMM Assessment Tool☆207Updated 11 months ago
- symbolic execution plugin for binary ninja☆342Updated last month
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆84Updated 2 years ago
- ☆112Updated 2 years ago
- A snapshotting, coverage-guided fuzzer for software (UEFI, Kernel, firmware, BIOS) built on SIMICS☆317Updated this week
- A custom ELF linker/loader for installing ET_REL binary patches at runtime☆176Updated this week
- Intel Management Engine JTAG Proof of Concept☆145Updated 5 years ago
- libLISA: Instruction Discovery and Analysis on x86-64☆119Updated 8 months ago
- A differential fuzzer for x86 decoders☆252Updated last year
- Nyxstone: assembly / disassembly library based on LLVM, implemented in C++ with Rust and Python bindings, maintained by emproof.com☆396Updated 11 months ago
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆160Updated 3 years ago
- 🍞 BREAD: BIOS Reverse Engineering & Advanced Debugger☆319Updated last month
- 🐉 Export ghidra decompiled code to dwarf sections inside ELF binary☆217Updated 2 years ago
- Determine which CPU architecture is used in a binary file.☆124Updated 8 months ago
- A bare minimum hypervisor on AMD and Intel processors for learners.☆318Updated last month
- Decompilation as a Service. Explore multiple decompilers and compare their output with minimal effort. Upload binary, get decompilation.☆457Updated 3 years ago
- This repository contains exploit and reverse-engineering source code regarding the Spectre-BHB/Branch History Injection vulnerability☆118Updated 3 years ago
- Damn Vulnerable UEFI☆293Updated last year
- Code deobfuscation framework to simplify Mixed Boolean-Arithmetic (MBA) expressions☆335Updated 6 months ago
- Core emulator components for Icicle☆255Updated last month
- Code Coverage Exploration Plugin for Ghidra☆368Updated last year
- Visualize the virtual address space of a Windows process on a Hilbert curve.☆304Updated 4 years ago
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆461Updated last year