zt-chen / voltpillager
☆31Updated 4 years ago
Alternatives and similar repositories for voltpillager:
Users that are interested in voltpillager are comparing it to the libraries listed below
- Research tools developed for Intel Wi-Fi chips☆52Updated last year
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Updated 2 years ago
- Thunderclap QEMU-based network card emulation☆27Updated 2 years ago
- Scripts to collect microcode from CPUMicrocodes Repo and to downgrade to a compatible microcode.☆19Updated 5 months ago
- A tool to perform so called BGE attack☆24Updated 11 months ago
- Helper plugin for analyzing UEFI firmware☆90Updated 9 months ago
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- Automated recovery of Linux kernel build configurations☆24Updated 3 years ago
- Alcatraz project for Black Hat USA 2021☆78Updated 3 years ago
- PoC for PixieFail vulnerabilities☆22Updated last year
- ☆35Updated 3 years ago
- A framework for parsing binary data.☆16Updated 2 years ago
- Files used for reproducing Fuzzware's experiments☆56Updated last year
- LKRG bypass methods☆71Updated 5 years ago
- Debugger for the Shannon Baseband☆58Updated 4 years ago
- ☆21Updated 3 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆13Updated 4 years ago
- ☆71Updated last year
- Exploiting the Semantic Gap in Trusted Execution Environments☆55Updated 5 years ago
- ☆119Updated 3 weeks ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆45Updated last year
- ☆32Updated 7 years ago
- iTLB multihit PoC☆40Updated last year
- A Ghidra processor module for the EFI Byte Code (EBC)☆31Updated 4 years ago
- A firmware base address search tool.☆44Updated 9 months ago
- tool for multi-execution jump coverage introspection☆63Updated last month
- baseband security research☆85Updated 3 years ago
- ☆21Updated last year
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆15Updated last month
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 2 years ago