vernamlab / TPM-FAILLinks
TPM-Fail Attack code & data
☆122Updated 2 years ago
Alternatives and similar repositories for TPM-FAIL
Users that are interested in TPM-FAIL are comparing it to the libraries listed below
Sorting:
- The code to the SGX-ROP paper☆184Updated 5 years ago
- TPM Genie is an I2C bus interposer for discrete Trusted Platform Modules☆214Updated 4 years ago
- ☆183Updated 4 years ago
- Tear the firmware apart with your bare hands;-)☆190Updated 3 years ago
- GLM uCode dumps☆289Updated 5 years ago
- X41 Smartcard Fuzzer☆119Updated 6 years ago
- IPC scripts for access to Intel CRBUS☆120Updated 3 years ago
- TRRespass☆124Updated 4 years ago
- Scout - Instruction based research debugger (a poor man's debugger)☆154Updated 2 years ago
- TPM vulnerability checking tool for CVE-2018-6622. This tool will be published at Black Hat Asia 2019 and Black Hat Europe 2019☆103Updated 3 years ago
- A low pin count sniffer for ICEStick - targeting TPM chips☆165Updated 5 years ago
- ☆149Updated 6 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆141Updated 4 years ago
- Tool for decrypting the firmware files for Samsung SSDs☆222Updated 4 years ago
- Intel Management Engine JTAG Proof of Concept☆142Updated 5 years ago
- RIDL test suite and exploits☆356Updated 5 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 6 years ago
- Intel Management Engine firmware loader plugin for IDA☆93Updated 7 years ago
- Linux i386 tool to load and execute ME modules.☆134Updated 4 years ago
- a low pin count sniffer for icestick☆95Updated 6 years ago
- Disabling kernel lockdown on Ubuntu without physical access☆79Updated 2 years ago
- This repository contains the tools we used in our research on the Google Titan M chip☆189Updated 2 years ago
- ☆78Updated 4 years ago
- ☆118Updated 4 years ago
- LKRG bypass methods☆72Updated 5 years ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆162Updated 3 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆80Updated 6 years ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆237Updated last year
- Extract BIOS firmware from Intel-based workstations and laptops☆335Updated last year