pietroborrello / ghidra-atom-microcode
Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode
☆80Updated last year
Related projects ⓘ
Alternatives and complementary repositories for ghidra-atom-microcode
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Updated 2 years ago
- This is an instruction to run your own SMM code.☆100Updated 3 years ago
- IDA plugin for extending UEFI reverse engineering capabilities☆55Updated 3 years ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆134Updated 3 years ago
- EFI DXE Emulator and Interactive Debugger☆82Updated 4 years ago
- A Ghidra processor module for the EFI Byte Code (EBC)☆29Updated 4 years ago
- The SAILR paper's evaluation pipline for measuring the quality of decompilation☆98Updated 2 months ago
- Tool to extract the kallsyms (System.map) from a memory dump☆24Updated last year
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆91Updated 7 years ago
- Ghidra Emulates Functions☆53Updated 4 years ago
- ☆89Updated 4 months ago
- NinjaDiff is a binary diffing plugin for Binary Ninja. Read more on our blog, and contribute code & improvements!☆57Updated 2 years ago
- ☆34Updated last year
- EFI DXE Emulator and Interactive Debugger☆86Updated 4 years ago
- Ghidra P-Code emulation and static LLVM lifting in Python☆29Updated 2 years ago
- A code skeleton of Samsung's Shannon S5000 baseband modem.☆42Updated 4 years ago
- Xyntia, the black-box deobfuscator☆62Updated last year
- Helper plugin for analyzing UEFI firmware☆90Updated 5 months ago
- The sample DXE runtime driver demonstrating how to program DMA remapping.☆58Updated 10 months ago
- ☆13Updated last year
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆63Updated 7 months ago
- Binary exploitation by confusing the unwinder☆59Updated last year
- Repository for officially supported Binary Ninja plugins