x86-JTAG-Open-Research / x86-JTAG-InformationLinks
☆189Updated 2 months ago
Alternatives and similar repositories for x86-JTAG-Information
Users that are interested in x86-JTAG-Information are comparing it to the libraries listed below
Sorting:
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆86Updated 2 years ago
- Determine which CPU architecture is used in a binary file.☆125Updated 8 months ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆100Updated 8 years ago
- ☆95Updated last year
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Updated 3 years ago
- Overview of Secure-Launch process on Qualcomm devices☆66Updated last year
- Supplemental material to our paper: "One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization"☆92Updated 3 years ago
- IDA plugin for extending UEFI reverse engineering capabilities☆62Updated 4 years ago
- Ghidra utilities for analyzing PC firmware☆452Updated 10 months ago
- UEFI and SMM Assessment Tool☆208Updated last year
- IPC scripts for access to Intel CRBUS☆120Updated 4 years ago
- EFI DXE Emulator and Interactive Debugger☆87Updated 5 years ago
- 🍞 BREAD: BIOS Reverse Engineering & Advanced Debugger☆319Updated last month
- A tool for UEFI firmware reverse engineering☆364Updated 11 months ago
- A Ghidra processor module for the EFI Byte Code (EBC)☆33Updated 5 years ago
- Python module for platform, iospace and physmem inspection☆24Updated 5 years ago
- Two stage x86 boot loader and preliminary kernel code which are combined into single binary file to be flashed to PCI expansion card with…☆36Updated 8 years ago
- This is an instruction to run your own SMM code.☆109Updated 4 years ago
- ☆33Updated 8 years ago
- Helper plugin for analyzing UEFI firmware☆89Updated last year
- Simple software tools for encoding and decoding dumps of NAND memory chips using implemented error correcting codes (ECC)☆92Updated 4 years ago
- ☆18Updated 5 years ago
- ☆96Updated last month
- ☆107Updated last year
- A Ghidra Loader for STM32 CPUs (WIP)☆41Updated 3 years ago
- PSP emulator☆93Updated 4 years ago
- Image manipulation tools for the Management Engine firmware☆42Updated 6 years ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆143Updated 4 years ago
- ☆116Updated 2 years ago
- Ghidra analyzer for UEFI firmware.☆371Updated last year