x86-JTAG-Open-Research / x86-JTAG-Information
☆174Updated last month
Alternatives and similar repositories for x86-JTAG-Information:
Users that are interested in x86-JTAG-Information are comparing it to the libraries listed below
- ☆92Updated 10 months ago
- IDA plugin for extending UEFI reverse engineering capabilities☆59Updated 3 years ago
- Helper plugin for analyzing UEFI firmware☆90Updated 10 months ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆96Updated 7 years ago
- EFI DXE Emulator and Interactive Debugger☆83Updated 4 years ago
- A tool for UEFI firmware reverse engineering☆341Updated 3 months ago
- UEFI and SMM Assessment Tool☆188Updated 5 months ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆138Updated 4 years ago
- EFI DXE Emulator and Interactive Debugger☆88Updated 5 years ago
- ☆98Updated 4 months ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆81Updated 2 years ago
- Ghidra utilities for analyzing PC firmware☆423Updated 3 months ago
- A Ghidra plugin for locating object file boundaries.☆123Updated 4 months ago
- Resources for Fault Injection☆49Updated last year
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Updated 2 years ago
- A Ghidra processor module for the EFI Byte Code (EBC)☆31Updated 4 years ago
- This is an instruction to run your own SMM code.☆103Updated 4 years ago
- a low pin count sniffer for icestick☆95Updated 6 years ago
- Overview of Secure-Launch process on Qualcomm devices☆58Updated last year
- ☆32Updated 7 years ago
- Determine which CPU architecture is used in a binary file.☆116Updated last month
- Supplemental material to our paper: "One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization"☆88Updated 2 years ago
- Ghidra analyzer for UEFI firmware.☆344Updated 10 months ago
- Python module for platform, iospace and physmem inspection☆24Updated 5 years ago
- Simple software tools for encoding and decoding dumps of NAND memory chips using implemented error correcting codes (ECC)☆84Updated 3 years ago
- Native Pcode emulator☆286Updated 8 months ago
- Two stage x86 boot loader and preliminary kernel code which are combined into single binary file to be flashed to PCI expansion card with…☆35Updated 8 years ago
- Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board☆78Updated last year
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆66Updated 8 years ago
- Image manipulation tools for the Management Engine firmware☆35Updated 6 years ago