pietroborrello / ghidra-atom-microcodeLinks
Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode
☆86Updated 2 years ago
Alternatives and similar repositories for ghidra-atom-microcode
Users that are interested in ghidra-atom-microcode are comparing it to the libraries listed below
Sorting:
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Updated 3 years ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆143Updated 4 years ago
- This is an instruction to run your own SMM code.☆109Updated 4 years ago
- IDA plugin for extending UEFI reverse engineering capabilities☆63Updated 4 years ago
- ☆95Updated last year
- EFI DXE Emulator and Interactive Debugger☆87Updated 5 years ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆100Updated 8 years ago
- Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.☆41Updated 2 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆175Updated last year
- Binja loader for AMD-SP or PSP firmware binaries.☆41Updated 2 years ago
- EFI DXE Emulator and Interactive Debugger☆93Updated 5 years ago
- Helper plugin for analyzing UEFI firmware☆91Updated last year
- Tool to extract the kallsyms (System.map) from a memory dump☆29Updated 2 years ago
- A Ghidra processor module for the EFI Byte Code (EBC)☆34Updated 5 years ago
- Python bindings for the Microsoft Hypervisor Platform APIs.☆80Updated 6 years ago
- Helper script for Linux kernel disassemble or debugging with IDA Pro on VMware + GDB stub (including some symbols helpers)☆37Updated 2 years ago
- ☆24Updated 4 years ago
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆71Updated 2 years ago
- A Binary Ninja plugin that automatically resolves type information for EFI protocol usage.☆38Updated 4 months ago
- This plugin serves as a bridge between Binary Ninja and Ghidra's disassembler.☆36Updated 3 years ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆71Updated last year
- ☆17Updated 2 years ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆54Updated 6 months ago
- ☆42Updated 2 years ago
- ☆79Updated 3 years ago
- ☆74Updated last year
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆64Updated last year
- This repository contains exploit and reverse-engineering source code regarding the Spectre-BHB/Branch History Injection vulnerability☆118Updated 3 years ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆70Updated 9 years ago
- ☆61Updated 9 months ago