vernamlab / TPM-FAILLinks
TPM-Fail Attack code & data
☆122Updated 2 years ago
Alternatives and similar repositories for TPM-FAIL
Users that are interested in TPM-FAIL are comparing it to the libraries listed below
Sorting:
- TPM Genie is an I2C bus interposer for discrete Trusted Platform Modules☆215Updated 4 years ago
- The code to the SGX-ROP paper☆184Updated 5 years ago
- IPC scripts for access to Intel CRBUS☆120Updated 3 years ago
- ☆183Updated 4 years ago
- GLM uCode dumps☆289Updated 5 years ago
- Tear the firmware apart with your bare hands;-)☆192Updated this week
- X41 Smartcard Fuzzer☆119Updated 6 years ago
- Tool for decrypting the firmware files for Samsung SSDs☆223Updated 4 years ago
- a low pin count sniffer for icestick☆95Updated 6 years ago
- A low pin count sniffer for ICEStick - targeting TPM chips☆165Updated 5 years ago
- Intel Management Engine firmware loader plugin for IDA☆93Updated 8 years ago
- Scout - Instruction based research debugger (a poor man's debugger)☆155Updated 2 years ago
- Linux i386 tool to load and execute ME modules.☆134Updated 4 years ago
- Disabling kernel lockdown on Ubuntu without physical access☆79Updated 2 years ago
- ☆29Updated 6 years ago
- TRRespass☆125Updated 4 years ago
- This repository contains the tools we used in our research on the Google Titan M chip☆191Updated 2 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- Intel Management Engine JTAG Proof of Concept☆142Updated 5 years ago
- TPM vulnerability checking tool for CVE-2018-6622. This tool will be published at Black Hat Asia 2019 and Black Hat Europe 2019☆103Updated 3 years ago
- Docs and resources on CPU Speculative Execution bugs☆376Updated 7 years ago
- ☆118Updated 4 years ago
- My UEFI security talk on ZeroNights 2015☆57Updated 9 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆80Updated 6 years ago
- Conferences, tools, papers, etc.☆43Updated last month
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆162Updated 3 years ago
- ☆74Updated 7 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆185Updated 2 years ago
- LKRG bypass methods☆72Updated 5 years ago
- ☆233Updated 6 months ago