xairy / dma-attacksLinks
Materials for my DMA attacks talk and a collection of related links
☆51Updated 11 months ago
Alternatives and similar repositories for dma-attacks
Users that are interested in dma-attacks are comparing it to the libraries listed below
Sorting:
- Breaking Secure Boot with SMM☆40Updated 3 years ago
- Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board☆81Updated last year
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆33Updated 2 years ago
- binary ninja related code☆35Updated 2 months ago
- Simple PoC for a bootkit written as a UEFI Option ROM Driver☆10Updated 2 years ago
- ☆21Updated 3 years ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆46Updated last week
- A plugin for Binary Ninja to query the Symgrate2 database.☆13Updated 3 years ago
- A dynamically loadable virtual-machine based rootkit designed for Linux Kernel v5.13.0 using AMD-V (SVM).☆29Updated 2 years ago
- ☆30Updated 3 weeks ago
- How to use LLVM passes☆32Updated 3 years ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆33Updated 4 months ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆30Updated 3 years ago
- breaking decompilers☆47Updated 3 weeks ago
- A collection of my scripts for research☆11Updated last month
- Simple Intel VT-x type-2 hypervisor for 64-bit Linux.☆19Updated 4 years ago
- ☆17Updated 4 years ago
- Ghidra analyzer for UEFI firmware.☆18Updated last year
- ☆28Updated last year
- Python bindings for BochsCPU☆36Updated this week
- ☆18Updated 3 years ago
- Tools for Linux kernel debugging on Bochs (including symbols, native Bochs debugger and IDA PRO)☆31Updated last year
- Symbolic executor for Binary Ninja's MLIL☆23Updated 8 months ago
- hypervisor enforced patch protection for the linux kernel with xen + libvmi, libvmi KASLR offset spoofer☆32Updated last year
- Tool to extract the kallsyms (System.map) from a memory dump☆26Updated last year
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago
- Intel Hardware Trace Library - Kernel Space Componment☆67Updated last month
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆29Updated 2 years ago
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆16Updated 3 months ago
- Helper script for Linux kernel disassemble or debugging with IDA Pro on VMware + GDB stub (including some symbols helpers)☆37Updated last year