xairy / dma-attacksLinks
Materials for my DMA attacks talk and a collection of related links
☆58Updated last year
Alternatives and similar repositories for dma-attacks
Users that are interested in dma-attacks are comparing it to the libraries listed below
Sorting:
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆33Updated 3 years ago
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆30Updated 2 years ago
- Breaking Secure Boot with SMM☆41Updated 3 years ago
- A firmware base address search tool.☆45Updated last year
- binary ninja related code☆37Updated 6 months ago
- Tools for Linux kernel debugging on Bochs (including symbols, native Bochs debugger and IDA PRO)☆32Updated 2 years ago
- ☆75Updated last year
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆83Updated 2 years ago
- ☆18Updated 4 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆31Updated 3 years ago
- ☆39Updated 2 months ago
- Official Solution and Source Code for the "Mock Kernel" challenge from UIUCTF 2023☆49Updated 2 years ago
- Ghidra analyzer for UEFI firmware.☆18Updated 2 years ago
- kAFL Fuzzer☆34Updated 7 months ago
- ☆82Updated 3 years ago
- ☆30Updated 2 years ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆142Updated 4 years ago
- nanoMIPS module for Ghidra☆52Updated this week
- ☆55Updated 3 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 2 years ago
- Efficient C implementation of Differential Fault Analysis on AES (round 8 or 9)☆27Updated 9 months ago
- ☆24Updated 4 years ago
- ☆94Updated last year
- ☆23Updated 10 months ago
- FirmWire has replaced ShannonEE. OLD: A dynamic analysis environment for Samsung's Shannon baseband.☆43Updated 3 years ago
- Python bindings for BochsCPU☆37Updated 2 months ago
- weggli ruleset scanner for source code and binaries☆32Updated last month
- Binary exploitation by confusing the unwinder☆65Updated 2 years ago
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆18Updated last year
- Helper script for Linux kernel disassemble or debugging with IDA Pro on VMware + GDB stub (including some symbols helpers)☆37Updated 2 years ago