x86-JTAG-Open-Research / x86-JTAG-Information
☆158Updated 2 weeks ago
Alternatives and similar repositories for x86-JTAG-Information:
Users that are interested in x86-JTAG-Information are comparing it to the libraries listed below
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆79Updated 2 years ago
- ☆92Updated 9 months ago
- Helper plugin for analyzing UEFI firmware☆90Updated 9 months ago
- Tool for decrypting and encrypting Pentium II microcode patches.☆26Updated 4 years ago
- Resources for Fault Injection☆47Updated last year
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆96Updated 7 years ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Updated 2 years ago
- IPC scripts for access to Intel CRBUS☆118Updated 3 years ago
- IDA plugin for extending UEFI reverse engineering capabilities☆59Updated 3 years ago
- Applications for reverse engineering architecture 8051 firmware☆134Updated 7 months ago
- This is an instruction to run your own SMM code.☆101Updated 4 years ago
- Determine which CPU architecture is used in a binary file.☆115Updated last week
- ☆96Updated 3 months ago
- EFI DXE Emulator and Interactive Debugger☆82Updated 4 years ago
- Supplemental material to our paper: "One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization"☆85Updated 2 years ago
- A Ghidra plugin for locating object file boundaries.☆122Updated 3 months ago
- A Ghidra Loader for STM32 CPUs (WIP)☆36Updated 2 years ago
- A Ghidra processor module for the EFI Byte Code (EBC)☆31Updated 4 years ago
- A tool for UEFI firmware reverse engineering☆339Updated 2 months ago
- EFI DXE Emulator and Interactive Debugger☆89Updated 4 years ago
- ☆32Updated 7 years ago
- Simple software tools for encoding and decoding dumps of NAND memory chips using implemented error correcting codes (ECC)☆81Updated 3 years ago
- ML-based ISA detection (architecture and endianness of binary code/sequences)☆64Updated last year
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆137Updated 3 years ago
- Binary Ninja plugin for the Avnera AV6xxx/AV7xxx architecture☆28Updated 9 months ago
- A step towards automating the creation of Ghidra processor modules☆37Updated 4 years ago
- Two stage x86 boot loader and preliminary kernel code which are combined into single binary file to be flashed to PCI expansion card with…☆36Updated 8 years ago
- PSP emulator☆87Updated 3 years ago
- Intel Management Engine JTAG Proof of Concept☆141Updated 4 years ago
- Code for generating Ghidra FidDb files (currently only for static libraries available in the CentOS repositories)☆82Updated 4 years ago