vernamlab / TPM-FAILLinks
TPM-Fail Attack code & data
☆122Updated 2 years ago
Alternatives and similar repositories for TPM-FAIL
Users that are interested in TPM-FAIL are comparing it to the libraries listed below
Sorting:
- The code to the SGX-ROP paper☆184Updated 5 years ago
- TPM Genie is an I2C bus interposer for discrete Trusted Platform Modules☆217Updated 4 years ago
- Tear the firmware apart with your bare hands;-)☆192Updated 2 months ago
- ☆183Updated 4 years ago
- IPC scripts for access to Intel CRBUS☆120Updated 4 years ago
- X41 Smartcard Fuzzer☆119Updated 6 years ago
- Scout - Instruction based research debugger (a poor man's debugger)☆156Updated 2 years ago
- Intel Management Engine firmware loader plugin for IDA☆93Updated 8 years ago
- GLM uCode dumps☆290Updated 5 years ago
- A low pin count sniffer for ICEStick - targeting TPM chips☆169Updated 5 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆186Updated 3 years ago
- Disabling kernel lockdown on Ubuntu without physical access☆80Updated 2 years ago
- RIDL test suite and exploits☆358Updated 5 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- ☆118Updated 4 years ago
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆49Updated 5 months ago
- Intel Management Engine JTAG Proof of Concept☆144Updated 5 years ago
- Intel ME Manufacturing Mode Detection Tools☆127Updated 6 years ago
- ☆78Updated 4 years ago
- Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic☆88Updated 3 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- TRRespass☆125Updated 4 years ago
- LKRG bypass methods☆73Updated 5 years ago
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆143Updated 4 years ago
- A tool to help you understand TPM commands and responses.☆47Updated 10 months ago
- Low Pin Count (LPC) Analyzer for Saleae Logic☆17Updated last year
- ☆149Updated 6 years ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆241Updated last year
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆80Updated 6 years ago
- This repository contains the tools we used in our research on the Google Titan M chip☆195Updated 3 years ago