- Bondurant, IA
- https://starkeblog.com/
- in/nicholas-starke-8a2a0bb
Highlights
- Pro
Stars
The runtime DXE driver monitoring access to the UEFI variables by hooking the runtime service table.
Reverse engineer and rewrite real mode DOS programs!
An LLM extension for Ghidra to enable AI assistance in RE.
Simple PoC for a bootkit written as a UEFI Option ROM Driver
This tool bruteforces the file offset and base load address for a raw binary program file
Binarly Vulnerability Research Advisories
The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.
Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares
The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.
Extraction tool for LG, Hisense, Sharp, Philips/TPV, Thompson and similar TVs/Embedded Devices
Port of devttyS0's IDA plugins to the Ghidra plugin framework, new plugins as well.
Discovering vulnerabilities in firmware through concolic analysis and function clustering.
Bootstrap yourself to write an OS from scratch. A book for self-learner.
Automatically exported from code.google.com/p/ioctlfuzzer
Pillage web accessible GIT, HG and BZR repositories
Find, verify, and analyze leaked credentials
A container repository for my public web hacks!
little scripts created during my time as a pentetration tester
A list of public penetration test reports published by several consulting firms and academic security groups.
A collection of fuzzers in a harness for testing the SpiderMonkey JavaScript engine.
Binfuzz.js: A Binary Fuzzer in JavaScript