xairy / dma-attacksLinks
Materials for my DMA attacks talk and a collection of related links
☆61Updated last year
Alternatives and similar repositories for dma-attacks
Users that are interested in dma-attacks are comparing it to the libraries listed below
Sorting:
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆30Updated 2 years ago
- binary ninja related code☆37Updated 8 months ago
- ☆75Updated last year
- ☆84Updated 3 years ago
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆19Updated 9 months ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆34Updated 3 years ago
- Breaking Secure Boot with SMM☆41Updated 3 years ago
- Tools for Linux kernel debugging on Bochs (including symbols, native Bochs debugger and IDA PRO)☆32Updated 2 years ago
- Ghidra analyzer for UEFI firmware.☆18Updated 2 years ago
- Official Solution and Source Code for the "Mock Kernel" challenge from UIUCTF 2023☆49Updated 2 years ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Updated 3 years ago
- ☆30Updated 2 years ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆86Updated 2 years ago
- ☆55Updated 3 years ago
- ☆38Updated last year
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 3 years ago
- Binary exploitation by confusing the unwinder☆66Updated 2 years ago
- IDA script for parsing kallsyms☆83Updated 5 months ago
- ☆39Updated 4 months ago
- TTexplore is a library that performs path exploration on binary code using symbolic execution☆81Updated 3 years ago
- Uncovering Container Confusion in the Linux Kernel☆45Updated last year
- ☆25Updated last year
- Python bindings for BochsCPU☆37Updated 3 months ago
- Raw IDA Kernel API for IDAPython☆34Updated 3 years ago
- ☆133Updated last month
- Code snippets for Binary Ninja's Python API☆30Updated 4 years ago
- A firmware base address search tool.☆46Updated last year
- kAFL Fuzzer☆34Updated 8 months ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 3 years ago
- ☆34Updated 4 years ago