x86-JTAG-Open-Research / x86-JTAG-InformationLinks
☆187Updated 3 months ago
Alternatives and similar repositories for x86-JTAG-Information
Users that are interested in x86-JTAG-Information are comparing it to the libraries listed below
Sorting:
- Supplemental material to our paper: "One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization"☆88Updated 3 years ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆82Updated 2 years ago
- Determine which CPU architecture is used in a binary file.☆121Updated 6 months ago
- UEFI and SMM Assessment Tool☆199Updated 9 months ago
- ☆95Updated last year
- IDA plugin for extending UEFI reverse engineering capabilities☆61Updated 3 years ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆33Updated 3 years ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆97Updated 8 years ago
- Ghidra utilities for analyzing PC firmware☆447Updated 8 months ago
- EFI DXE Emulator and Interactive Debugger☆85Updated 5 years ago
- Helper plugin for analyzing UEFI firmware☆90Updated last year
- PSP emulator☆91Updated 4 years ago
- Overview of Secure-Launch process on Qualcomm devices☆63Updated last year
- A Ghidra processor module for the EFI Byte Code (EBC)☆32Updated 5 years ago
- ☆104Updated 9 months ago
- This is an instruction to run your own SMM code.☆108Updated 4 years ago
- IPC scripts for access to Intel CRBUS☆120Updated 4 years ago
- MFS and CFG file manipulation utility☆30Updated 5 years ago
- Tool for decrypting and encrypting Pentium II microcode patches.☆28Updated 3 months ago
- Image manipulation tools for the Management Engine firmware☆41Updated 6 years ago
- Python module for platform, iospace and physmem inspection☆24Updated 5 years ago
- A tool for UEFI firmware reverse engineering☆356Updated 8 months ago
- 🍞 BREAD: BIOS Reverse Engineering & Advanced Debugger☆314Updated last year
- Ghidra analyzer for UEFI firmware.☆361Updated last year
- Resources for Fault Injection☆57Updated last year
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆142Updated 4 years ago
- Binja loader for AMD-SP or PSP firmware binaries.☆37Updated 2 years ago
- ☆18Updated 4 years ago
- Simple software tools for encoding and decoding dumps of NAND memory chips using implemented error correcting codes (ECC)☆88Updated 3 years ago
- Applications for reverse engineering architecture 8051 firmware☆165Updated last year