x86-JTAG-Open-Research / x86-JTAG-InformationLinks
☆187Updated 2 months ago
Alternatives and similar repositories for x86-JTAG-Information
Users that are interested in x86-JTAG-Information are comparing it to the libraries listed below
Sorting:
- UEFI and SMM Assessment Tool☆199Updated 9 months ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆82Updated 2 years ago
- Supplemental material to our paper: "One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization"☆88Updated 2 years ago
- IDA plugin for extending UEFI reverse engineering capabilities☆61Updated 3 years ago
- ☆94Updated last year
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆33Updated 2 years ago
- Determine which CPU architecture is used in a binary file.☆121Updated 5 months ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆97Updated 8 years ago
- ☆103Updated 8 months ago
- EFI DXE Emulator and Interactive Debugger☆85Updated 5 years ago
- Simple software tools for encoding and decoding dumps of NAND memory chips using implemented error correcting codes (ECC)☆87Updated 3 years ago
- Helper plugin for analyzing UEFI firmware☆90Updated last year
- Python module for platform, iospace and physmem inspection☆25Updated 5 years ago
- Resources for Fault Injection☆57Updated last year
- Image manipulation tools for the Management Engine firmware☆40Updated 6 years ago
- ☆32Updated 8 years ago
- Overview of Secure-Launch process on Qualcomm devices☆63Updated last year
- Ghidra utilities for analyzing PC firmware☆445Updated 7 months ago
- ☆18Updated 4 years ago
- A tool for UEFI firmware reverse engineering☆354Updated 7 months ago
- Tensilica Xtensa processor module for Ghidra☆106Updated last year
- MFS and CFG file manipulation utility☆29Updated 5 years ago
- IPC scripts for access to Intel CRBUS☆120Updated 4 years ago
- a low pin count sniffer for icestick☆95Updated 6 years ago
- Thunderbolt Controller Firmware Patcher.☆67Updated 2 years ago
- A Ghidra processor module for the EFI Byte Code (EBC)☆32Updated 5 years ago
- Applications for reverse engineering architecture 8051 firmware☆164Updated last year
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆112Updated 2 years ago
- This is an instruction to run your own SMM code.☆108Updated 4 years ago
- The runtime DXE driver monitoring access to the UEFI variables by hooking the runtime service table.☆145Updated 4 years ago