quarkslab / tpmee
☆9Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for tpmee
- SPI flash read MitM attack PoC☆36Updated 2 years ago
- Breaking Secure Boot with SMM☆39Updated 2 years ago
- ☆14Updated 2 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago
- PoC code and tools for Black Hat USA 2024☆15Updated 3 months ago
- Python interface for Binexport, the Bindiff export format☆14Updated 4 months ago
- ☆12Updated last year
- Extract data of TTD trace file to a minidump☆28Updated last year
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆22Updated 9 months ago
- ☆26Updated 3 weeks ago
- An IDA plugin to deal with Event Tracing for Windows (ETW)☆50Updated 2 years ago
- Ghidra analyzer for UEFI firmware.☆15Updated last year
- Will try to put here slides from now on when I give a talk☆23Updated 3 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆34Updated last year
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- Not necessarily related to software bugs and exploits; this repo contains snippets of code that demonstrate some interesting functionalit…☆33Updated 3 years ago
- Slides about HyperDbg☆29Updated 5 months ago
- Dynamic-Static binary instrumentation framework on top of GDB☆49Updated last year
- ☆14Updated last year
- ☆9Updated last month
- Utilities for working with vivisect☆23Updated 3 weeks ago
- RenameLocalVars is an IDA plugin that renames local variables to something easier to read.☆15Updated last year
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 2 years ago
- ☆28Updated 4 years ago
- ☆20Updated 3 years ago
- Rekall Memory Forensic Framework☆29Updated 5 years ago
- ☆39Updated 3 years ago
- Wrapper around Ghidra's analyzeHeadless script☆12Updated 2 years ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆34Updated 2 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Updated 4 years ago