zt-chen / voltpillagerLinks
☆32Updated 4 years ago
Alternatives and similar repositories for voltpillager
Users that are interested in voltpillager are comparing it to the libraries listed below
Sorting:
- Research tools developed for Intel Wi-Fi chips☆56Updated 4 months ago
- Spectre based on Linear Address Masking☆67Updated last year
- Scripts to collect microcode from CPUMicrocodes Repo and to downgrade to a compatible microcode.☆19Updated last year
- Helper plugin for analyzing UEFI firmware☆90Updated last year
- This repository contains exploit and reverse-engineering source code regarding the Spectre-BHB/Branch History Injection vulnerability☆118Updated 3 years ago
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- PoC for PixieFail vulnerabilities☆24Updated last year
- This repository contains the tools we used in our research on the Google Titan M chip☆195Updated 3 years ago
- ☆112Updated 2 years ago
- ☆38Updated 3 years ago
- Nailgun attack on ARM devices.☆164Updated 4 years ago
- LKRG bypass methods☆73Updated 5 years ago
- Mimojas Firmware Toolkit for unpacking and analysis firmware images☆14Updated 5 years ago
- Files used for reproducing Fuzzware's experiments☆60Updated 2 years ago
- Thunderclap QEMU-based network card emulation☆27Updated 3 years ago
- Vault Exploit Defense☆127Updated last year
- ☆75Updated last year
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Updated 5 years ago
- iTLB multihit PoC☆42Updated last year
- ugly code to check linux kernel memory and dump some internal structures☆48Updated 11 months ago
- A hacky tool for analysing linux kernel commits☆37Updated 2 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- ☆20Updated 2 years ago
- ☆133Updated 2 weeks ago
- A tool to perform so called BGE attack☆25Updated 4 months ago
- A tool for firmware cartography☆160Updated 4 months ago
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆237Updated 6 months ago
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated 2 years ago
- Binarly Vulnerability Research Advisories☆181Updated 2 weeks ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆98Updated 8 years ago