shijunjing / edk2Links
EDK II
☆16Updated last year
Alternatives and similar repositories for edk2
Users that are interested in edk2 are comparing it to the libraries listed below
Sorting:
- EFI DXE Emulator and Interactive Debugger☆86Updated 5 years ago
- EFI DXE Emulator and Interactive Debugger☆94Updated 5 years ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆67Updated 8 years ago
- IDA plugin for extending UEFI reverse engineering capabilities☆61Updated 3 years ago
- ☆14Updated last week
- ☆95Updated last year
- This is an instruction to run your own SMM code.☆109Updated 4 years ago
- Some scripts for IDA Pro to assist with reverse engineering EFI binaries☆79Updated 10 years ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆98Updated 8 years ago
- System Management RAM analysis tool☆82Updated last year
- The runtime DXE driver monitoring access to the UEFI variables by hooking the runtime service table.☆145Updated 4 years ago
- ☆27Updated 3 years ago
- Helper plugin for analyzing UEFI firmware☆90Updated last year
- A Ghidra processor module for the EFI Byte Code (EBC)☆32Updated 5 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆28Updated 2 years ago
- Linux kernel source tree patched with Hypervisor-Enforced Kernel Integrity☆13Updated last year
- ☆13Updated 9 months ago
- My UEFI security talk on ZeroNights 2015☆58Updated 9 years ago
- ☆70Updated 5 years ago
- QEMU enhanced with OS handlers, external plugins, and rapid analysis execution engine.☆41Updated 5 years ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆82Updated 2 years ago
- ☆151Updated 4 months ago
- ☆93Updated last year
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆142Updated 4 years ago
- Helper script for Linux kernel disassemble or debugging with IDA Pro on VMware + GDB stub (including some symbols helpers)☆36Updated 2 years ago
- Framework for in-VM test execution and monitoring, inspired by Sandsifter☆11Updated last week
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆69Updated last year
- ☆55Updated 7 months ago
- TPM 2.0 tools running in EFI environment☆23Updated 6 years ago
- Intel x86 bare metal hypervisor for researching snapshot fuzzing ideas.☆167Updated 4 years ago