vernamlab / TPM-FAILLinks
TPM-Fail Attack code & data
☆122Updated 2 years ago
Alternatives and similar repositories for TPM-FAIL
Users that are interested in TPM-FAIL are comparing it to the libraries listed below
Sorting:
- TPM Genie is an I2C bus interposer for discrete Trusted Platform Modules☆216Updated 4 years ago
- The code to the SGX-ROP paper☆184Updated 5 years ago
- Tear the firmware apart with your bare hands;-)☆193Updated 3 weeks ago
- ☆183Updated 4 years ago
- X41 Smartcard Fuzzer☆119Updated 6 years ago
- GLM uCode dumps☆289Updated 5 years ago
- Scout - Instruction based research debugger (a poor man's debugger)☆155Updated 2 years ago
- A low pin count sniffer for ICEStick - targeting TPM chips☆166Updated 5 years ago
- IPC scripts for access to Intel CRBUS☆120Updated 4 years ago
- Intel Management Engine firmware loader plugin for IDA☆93Updated 8 years ago
- TPM vulnerability checking tool for CVE-2018-6622. This tool will be published at Black Hat Asia 2019 and Black Hat Europe 2019☆104Updated 3 years ago
- TRRespass☆125Updated 4 years ago
- ☆29Updated 6 years ago
- Intel ME Manufacturing Mode Detection Tools☆127Updated 6 years ago
- Disabling kernel lockdown on Ubuntu without physical access☆79Updated 2 years ago
- Tool for decrypting the firmware files for Samsung SSDs☆224Updated 4 years ago
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆48Updated 4 months ago
- BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials☆67Updated 5 years ago
- Intel Management Engine JTAG Proof of Concept☆142Updated 5 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- a low pin count sniffer for icestick☆95Updated 6 years ago
- LKRG bypass methods☆72Updated 5 years ago
- Linux i386 tool to load and execute ME modules.☆134Updated 4 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 6 years ago
- RIDL test suite and exploits☆357Updated 5 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆152Updated 5 years ago
- A tool to help you understand TPM commands and responses.☆46Updated 8 months ago
- Tool for visualizing and empirically analyzing information encoded in binary files☆79Updated 4 years ago
- Docs and resources on CPU Speculative Execution bugs☆376Updated 7 years ago
- PC firmware exploitation tool and library☆256Updated 3 years ago