x86-JTAG-Open-Research / x86-JTAG-Information
☆177Updated 2 months ago
Alternatives and similar repositories for x86-JTAG-Information
Users that are interested in x86-JTAG-Information are comparing it to the libraries listed below
Sorting:
- IDA plugin for extending UEFI reverse engineering capabilities☆59Updated 3 years ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆82Updated 2 years ago
- Helper plugin for analyzing UEFI firmware☆90Updated 11 months ago
- ☆92Updated 10 months ago
- A tool for UEFI firmware reverse engineering☆343Updated 4 months ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆97Updated 8 years ago
- Supplemental material to our paper: "One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization"☆88Updated 2 years ago
- The runtime DXE driver monitoring access to the UEFI variables by hooking the runtime service table.☆140Updated 4 years ago
- ☆32Updated 8 years ago
- EFI DXE Emulator and Interactive Debugger☆85Updated 5 years ago
- Ghidra utilities for analyzing PC firmware☆428Updated 4 months ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆140Updated 4 years ago
- This is an instruction to run your own SMM code.☆104Updated 4 years ago
- UEFI and SMM Assessment Tool☆189Updated 5 months ago
- Resources for Fault Injection☆51Updated last year
- Ghidra analyzer for UEFI firmware.☆346Updated 11 months ago
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆228Updated 2 weeks ago
- ☆100Updated 5 months ago
- Python module for platform, iospace and physmem inspection☆24Updated 5 years ago
- Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board☆78Updated last year
- Binarly Vulnerability Research Advisories☆174Updated last month
- EFI DXE Emulator and Interactive Debugger☆88Updated 5 years ago
- The first analysis framework for CPU microcode☆392Updated 2 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆161Updated last year
- PSP emulator☆88Updated 4 years ago
- Determine which CPU architecture is used in a binary file.☆118Updated 2 months ago
- Two stage x86 boot loader and preliminary kernel code which are combined into single binary file to be flashed to PCI expansion card with…☆35Updated 8 years ago
- A Ghidra processor module for the EFI Byte Code (EBC)☆31Updated 4 years ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆33Updated 2 years ago
- Some scripts for IDA Pro to assist with reverse engineering EFI binaries☆298Updated 5 years ago