vernamlab / TPM-FAILLinks
TPM-Fail Attack code & data
☆124Updated 2 years ago
Alternatives and similar repositories for TPM-FAIL
Users that are interested in TPM-FAIL are comparing it to the libraries listed below
Sorting:
- TPM Genie is an I2C bus interposer for discrete Trusted Platform Modules☆225Updated 5 years ago
- The code to the SGX-ROP paper☆185Updated 5 years ago
- IPC scripts for access to Intel CRBUS☆121Updated 4 years ago
- ☆186Updated 5 years ago
- GLM uCode dumps☆295Updated 5 years ago
- Tear the firmware apart with your bare hands;-)☆192Updated 6 months ago
- TRRespass☆127Updated 4 years ago
- A low pin count sniffer for ICEStick - targeting TPM chips☆170Updated 5 years ago
- X41 Smartcard Fuzzer☆120Updated 7 years ago
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆50Updated 9 months ago
- Scout - Instruction based research debugger (a poor man's debugger)☆155Updated 2 years ago
- Disabling kernel lockdown on Ubuntu without physical access☆81Updated 3 years ago
- Intel Management Engine JTAG Proof of Concept☆145Updated 5 years ago
- RIDL test suite and exploits☆366Updated 5 years ago
- Tool for decrypting the firmware files for Samsung SSDs☆232Updated 4 years ago
- Intel Management Engine firmware loader plugin for IDA☆93Updated 8 years ago
- ☆78Updated 4 years ago
- ☆118Updated 5 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆154Updated 5 years ago
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆144Updated 4 years ago
- TPM vulnerability checking tool for CVE-2018-6622. This tool will be published at Black Hat Asia 2019 and Black Hat Europe 2019☆106Updated 3 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 7 years ago
- ☆35Updated 3 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago
- Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic☆90Updated 4 years ago
- ☆29Updated 6 years ago
- BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials☆69Updated 5 years ago
- a low pin count sniffer for icestick☆99Updated 6 years ago
- Linux i386 tool to load and execute ME modules.☆137Updated 4 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆82Updated 6 years ago