MicrocodeDecryptor VS IntelTXE-PoC

Compare MicrocodeDecryptor vs IntelTXE-PoC and see what are their differences.

InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
MicrocodeDecryptor IntelTXE-PoC
15 2
1,478 136
- -
0.0 10.0
almost 2 years ago almost 4 years ago
Python Python
- -
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

MicrocodeDecryptor

Posts with mentions or reviews of MicrocodeDecryptor. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-07-22.

IntelTXE-PoC

Posts with mentions or reviews of IntelTXE-PoC. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-07-19.
  • Intel Microcode Decrpyor
    4 projects | /r/hardware | 19 Jul 2022
    These researched managed to do this! (PoC). Modifying microcode is possible thanks to their previous work. By exploiting bugs in the BUP module (responsible for hardware bring-up/initialization) in the TXE firmware (Trusted Execution Engine, the Atom analogue of the Management Engine on Core/Xeon), they were able to eventually enable Intel's internal JTAG interface, also known as red unlock. This is normally disabled on production systems and requires keys from Intel to unlock it. However, a design flaw in BUP combined with code execution allowed red unlock to be enabled without Intel's keys. Red unlock is extremely powerful - not only does it let you debug the CPU core, it also lets you debug other devices and IP blocks (including TXE/ME). You can even use it to access internal microarchitectural state, including the microcode sequencer ROM. This allowed them to dump the (decrypted) microcode from a Goldmont CPU. They eventually managed to reverse engineer the micro-op format and released a microcode disassembler.
  • Undocumented x86 instructions to read/ write microcode
    1 project | news.ycombinator.com | 6 Feb 2022

What are some alternatives?

When comparing MicrocodeDecryptor and IntelTXE-PoC you can also consider the following projects:

PicoCart64 - N64 development cart using a Raspberry Pi RP2040

uCodeDisasm

riscv-uefi-edk2-docs - Documentation and status of UEFI on RISC-V

crbus_scripts - IPC scripts for access to Intel CRBUS

JJazzLab-X - Moved to JJazzLab repo

bashttp - µServer in Bash

build-your-own-x - Master programming by recreating your favorite technologies from scratch.

uefidoom - Port of Doom to UEFI.

CHIPnGo - A custom-built CHIP-8 hand-held gaming console powered by a STM32 microcontroller.

hssp - CLI to avoid remembering the http status codes