retrage / efiSeekLinks
Ghidra analyzer for UEFI firmware.
☆19Updated last year
Alternatives and similar repositories for efiSeek
Users that are interested in efiSeek are comparing it to the libraries listed below
Sorting:
- ☆18Updated 3 years ago
- Breaking Secure Boot with SMM☆41Updated 3 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- ☆28Updated 2 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆60Updated 2 years ago
- Python interface for Binexport, the Bindiff export format☆16Updated last week
- Python bindings for BochsCPU☆36Updated 3 weeks ago
- binary ninja related code☆35Updated 2 months ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- ☆14Updated 2 years ago
- An AFL scaling benchmarking tool☆18Updated 5 years ago
- ☆12Updated 3 years ago
- A simple, web based dashboard to use with LibAFL + OnDiskJSONMonitor☆24Updated last year
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆29Updated 2 years ago
- ☆34Updated 3 years ago
- Here I store my proof of concepts☆14Updated 9 months ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆30Updated 3 years ago
- WinAFL modified for RDP client fuzzing☆19Updated 2 years ago
- winafl with mopt mutators and afl fast power schedulers.☆22Updated 4 months ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 4 years ago
- A Simple VM-based challenge created using the academic tigress obfuscator☆18Updated 2 years ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆41Updated 3 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆33Updated 4 months ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 3 years ago
- ☆40Updated 4 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 6 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- IDA (sort of) headless☆24Updated last year