theopolis / subzero
Firmware analysis gone wild.
☆42Updated 10 years ago
Alternatives and similar repositories for subzero:
Users that are interested in subzero are comparing it to the libraries listed below
- An EFI image parser and dissector☆50Updated 11 years ago
- A TE executable format loader for IDA☆28Updated 9 years ago
- My UEFI security talk on ZeroNights 2015☆57Updated 9 years ago
- This repository contains Python 2.7 scripts for parsing MFS/MFSB partition and extracting contained files.☆31Updated 7 years ago
- Intel Management Engine firmware loader plugin for IDA☆90Updated 7 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆44Updated 8 years ago
- ☆73Updated 7 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆39Updated 6 years ago
- ☆24Updated 9 years ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆65Updated 8 years ago
- SIGSTOPing ELF binaries since 0x7E1☆52Updated 7 months ago
- repository with additional materials and source code☆30Updated 8 years ago
- Crawl/download UEFI/BIOS updates from ISV/OEM distributors.☆73Updated 10 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Updated 10 years ago
- XED based Disassembly Engine☆18Updated 6 years ago
- Primitive TE to PE32 converter☆33Updated 2 weeks ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 9 years ago
- Betraying the BIOS: Where the Guardians of the BIOS are Failing☆59Updated 7 years ago
- JEFF file format tools☆27Updated 9 years ago
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Updated 10 years ago
- ☆117Updated 4 years ago
- an open source toolkit for PCI bus exploration☆70Updated 8 years ago
- Tools for viewing and extracting HDD firmware files☆72Updated 10 years ago
- Integrity checking script for Apple Thunderbolt to Ethernet adapters, to check for attacks similar to Thunderstrike 2☆26Updated 9 years ago
- Misc PoCs for various research topics☆21Updated 2 years ago
- Tools for analyzing hexagon code☆38Updated 8 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 10 years ago
- lte security☆41Updated 9 years ago
- Interactive Virtual Machine Introspection☆18Updated 7 years ago
- The plugin is an integration of Virus Battle API to the well known IDA Disassembler.☆20Updated 9 years ago