vernamlab / TPM-FAILLinks
TPM-Fail Attack code & data
☆122Updated 2 years ago
Alternatives and similar repositories for TPM-FAIL
Users that are interested in TPM-FAIL are comparing it to the libraries listed below
Sorting:
- The code to the SGX-ROP paper☆184Updated 5 years ago
- TPM Genie is an I2C bus interposer for discrete Trusted Platform Modules☆222Updated 4 years ago
- ☆185Updated 4 years ago
- IPC scripts for access to Intel CRBUS☆120Updated 4 years ago
- X41 Smartcard Fuzzer☆120Updated 6 years ago
- GLM uCode dumps☆293Updated 5 years ago
- TRRespass☆125Updated 4 years ago
- Tear the firmware apart with your bare hands;-)☆193Updated 4 months ago
- Scout - Instruction based research debugger (a poor man's debugger)☆156Updated 2 years ago
- A low pin count sniffer for ICEStick - targeting TPM chips☆168Updated 5 years ago
- TPM vulnerability checking tool for CVE-2018-6622. This tool will be published at Black Hat Asia 2019 and Black Hat Europe 2019☆106Updated 3 years ago
- Intel Management Engine firmware loader plugin for IDA☆93Updated 8 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆187Updated 3 years ago
- Tools for timing attacks☆19Updated 10 years ago
- a low pin count sniffer for icestick☆97Updated 6 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- Intel Management Engine JTAG Proof of Concept☆145Updated 5 years ago
- RIDL test suite and exploits☆359Updated 5 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 7 years ago
- ☆78Updated 4 years ago
- Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic☆89Updated 4 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 7 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆61Updated 8 years ago
- Bleichenbachers "Million message attack" on RSA in Python☆30Updated 4 years ago
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆50Updated 7 months ago
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆144Updated 4 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆153Updated 5 years ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆163Updated 3 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago