xairy / dma-attacksLinks
Materials for my DMA attacks talk and a collection of related links
☆53Updated last year
Alternatives and similar repositories for dma-attacks
Users that are interested in dma-attacks are comparing it to the libraries listed below
Sorting:
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆17Updated 4 months ago
- Tool to extract the kallsyms (System.map) from a memory dump☆27Updated last year
- Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board☆83Updated last year
- Breaking Secure Boot with SMM☆41Updated 3 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆30Updated 3 years ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆33Updated 2 years ago
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆29Updated 2 years ago
- binary ninja related code☆35Updated 2 months ago
- A dynamically loadable virtual-machine based rootkit designed for Linux Kernel v5.13.0 using AMD-V (SVM).☆29Updated 3 years ago
- Ghidra analyzer for UEFI firmware.☆19Updated 2 years ago
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆17Updated last year
- Intel Hardware Trace Library - Kernel Space Componment☆69Updated 2 months ago
- EFI DXE Emulator and Interactive Debugger☆85Updated 5 years ago
- ☆57Updated 3 months ago
- Simple PoC for a bootkit written as a UEFI Option ROM Driver☆10Updated 2 years ago
- Tools for Linux kernel debugging on Bochs (including symbols, native Bochs debugger and IDA PRO)☆31Updated last year
- Helper script for Linux kernel disassemble or debugging with IDA Pro on VMware + GDB stub (including some symbols helpers)☆37Updated last year
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆61Updated 10 months ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 3 years ago
- ☆21Updated 3 years ago
- Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.☆41Updated 2 years ago
- A plugin for Binary Ninja to query the Symgrate2 database.☆13Updated 3 years ago
- ☆82Updated 2 years ago
- A tool combining DWARF info and source to search for kernel heap objects☆24Updated last year
- breaking decompilers☆49Updated last month
- ☆74Updated last year
- ☆33Updated last month
- LiteX-based PCIe MITM, sniffing, fuzzing, device emulation☆15Updated 3 years ago
- Simple AMD-V (SVM) Virtualization Extensions Demo☆21Updated 7 years ago
- kAFL Fuzzer☆33Updated 3 months ago