zanderdk / lib-microLinks
☆15Updated last year
Alternatives and similar repositories for lib-micro
Users that are interested in lib-micro are comparing it to the libraries listed below
Sorting:
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆82Updated 2 years ago
- Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks☆37Updated 4 years ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆66Updated 8 years ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆69Updated last year
- ☆26Updated last year
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆33Updated 2 years ago
- ☆32Updated 8 years ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Updated last year
- Helper plugin for analyzing UEFI firmware☆90Updated last year
- A Ghidra processor module for the EFI Byte Code (EBC)☆32Updated 5 years ago
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆74Updated 2 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆75Updated 5 years ago
- ☆39Updated 2 years ago
- EFI DXE Emulator and Interactive Debugger☆85Updated 5 years ago
- IPC scripts for access to Intel CRBUS☆120Updated 3 years ago
- System Management RAM analysis tool☆79Updated 11 months ago
- ☆113Updated last year
- Linux kernel branches for confidential compute research☆18Updated 3 months ago
- Thunderclap QEMU-based network card emulation☆27Updated 2 years ago
- ☆74Updated 7 years ago
- Scripts to collect microcode from CPUMicrocodes Repo and to downgrade to a compatible microcode.☆20Updated 9 months ago
- Exploit generator for Intel ME 11 buffer overflow☆33Updated 5 years ago
- ☆58Updated 4 months ago
- ☆112Updated 2 years ago
- This is an instruction to run your own SMM code.☆107Updated 4 years ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆97Updated 8 years ago
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆61Updated 11 months ago
- Tool to extract the kallsyms (System.map) from a memory dump☆28Updated last year
- ☆70Updated 5 years ago
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆59Updated 8 years ago