x86-JTAG-Open-Research / x86-JTAG-Information
☆155Updated this week
Alternatives and similar repositories for x86-JTAG-Information:
Users that are interested in x86-JTAG-Information are comparing it to the libraries listed below
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆97Updated 7 years ago
- IDA plugin for extending UEFI reverse engineering capabilities☆58Updated 3 years ago
- Resources for Fault Injection☆45Updated 11 months ago
- Determine which CPU architecture is used in a binary file.☆115Updated 11 months ago
- ☆93Updated 2 months ago
- This is an instruction to run your own SMM code.☆101Updated 3 years ago
- Supplemental material to our paper: "One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization"☆84Updated 2 years ago
- ☆92Updated 7 months ago
- EFI DXE Emulator and Interactive Debugger☆82Updated 4 years ago
- A Ghidra processor module for the EFI Byte Code (EBC)☆30Updated 4 years ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆79Updated last year
- Helper plugin for analyzing UEFI firmware☆90Updated 8 months ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Updated 2 years ago
- Binary Ninja plugin for the Avnera AV6xxx/AV7xxx architecture☆28Updated 8 months ago
- Applications for reverse engineering architecture 8051 firmware☆134Updated 6 months ago
- A Ghidra plugin for locating object file boundaries.☆121Updated 2 months ago
- EFI DXE Emulator and Interactive Debugger☆89Updated 4 years ago
- Tool for decrypting and encrypting Pentium II microcode patches.☆26Updated 4 years ago
- A step towards automating the creation of Ghidra processor modules☆37Updated 4 years ago
- ML-based ISA detection (architecture and endianness of binary code/sequences)☆64Updated last year
- Code for generating Ghidra FidDb files (currently only for static libraries available in the CentOS repositories)☆81Updated 4 years ago
- PSP emulator☆87Updated 3 years ago
- ☆32Updated 7 years ago
- UEFI and SMM Assessment Tool☆180Updated 2 months ago
- IPC scripts for access to Intel CRBUS☆118Updated 3 years ago
- A tool for UEFI firmware reverse engineering☆340Updated last month
- ☆132Updated 3 years ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆64Updated 8 years ago
- Image manipulation tools for the Management Engine firmware☆34Updated 5 years ago
- Ghidra utilities for analyzing PC firmware☆414Updated last month