pietroborrello / ghidra-atom-microcodeLinks
Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode
☆86Updated 2 years ago
Alternatives and similar repositories for ghidra-atom-microcode
Users that are interested in ghidra-atom-microcode are comparing it to the libraries listed below
Sorting:
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Updated 3 years ago
- EFI DXE Emulator and Interactive Debugger☆87Updated 5 years ago
- This is an instruction to run your own SMM code.☆109Updated 4 years ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆143Updated 4 years ago
- IDA plugin for extending UEFI reverse engineering capabilities☆63Updated 4 years ago
- Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.☆41Updated 2 years ago
- ☆95Updated last year
- ☆62Updated 9 months ago
- A Ghidra processor module for the EFI Byte Code (EBC)☆34Updated 5 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆175Updated last year
- ☆42Updated 2 years ago
- Binja loader for AMD-SP or PSP firmware binaries.☆41Updated 2 years ago
- Helper plugin for analyzing UEFI firmware☆91Updated last year
- Tool to extract the kallsyms (System.map) from a memory dump☆29Updated 2 years ago
- EFI DXE Emulator and Interactive Debugger☆93Updated 5 years ago
- This plugin serves as a bridge between Binary Ninja and Ghidra's disassembler.☆36Updated 3 years ago
- A Binary Ninja plugin that automatically resolves type information for EFI protocol usage.☆38Updated 5 months ago
- This repository contains exploit and reverse-engineering source code regarding the Spectre-BHB/Branch History Injection vulnerability☆118Updated 3 years ago
- ☆74Updated last year
- Helper script for Linux kernel disassemble or debugging with IDA Pro on VMware + GDB stub (including some symbols helpers)☆37Updated 2 years ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆73Updated 9 years ago
- TTexplore is a library that performs path exploration on binary code using symbolic execution☆81Updated 3 years ago
- Repository for officially supported Binary Ninja plugins☆54Updated last week
- Python bindings for the Microsoft Hypervisor Platform APIs.☆80Updated 6 years ago
- ☆79Updated 3 years ago
- ☆17Updated 2 years ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆72Updated last year
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆100Updated 8 years ago
- Ghidra Emulates Functions☆56Updated 5 years ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆54Updated 7 months ago