mei-amt-check VS INTEL-SA-00075-Linux-Detection-And-Mitigation-Tools

Compare mei-amt-check vs INTEL-SA-00075-Linux-Detection-And-Mitigation-Tools and see what are their differences.

Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
mei-amt-check INTEL-SA-00075-Linux-Detection-And-Mitigation-Tools
3 1
454 59
- -
10.0 10.0
almost 6 years ago over 1 year ago
C C
GNU General Public License v3.0 only GNU General Public License v3.0 only
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

mei-amt-check

Posts with mentions or reviews of mei-amt-check. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-02-07.
  • Ask HN: How to know if laptop enrolled in Intel Management Engine?
    2 projects | news.ycombinator.com | 7 Feb 2023
    There's two different components here. The first is the Management Engine. Unless this laptop is extremely old, it has one, and it's running. Depending on age, you may be able to prevent it from booting while still allowing the rest of the system to run, but probably not. The second is Intel's Advanced Management Technology (AMT). This is only available on systems with VPro badging, which generally means higher-end business laptops. AMT is much less widely used than you might think, so it's probably not enrolled anywhere. You can confirm whether AMT has been provisioned with https://github.com/mjg59/mei-amt-check, and as long as you have the system firmware password you should be able to reset the ME regardless.
  • The Privacy, Security, & OSINT Show: 272-Processor Attacks Explained
    5 projects | /r/PrivacySecurityOSINT | 29 Jul 2022
    Paul Asadoorian https://twitter.com/securityweekly https://eclypsium.com/2022/07/26/firmware-security-realizations-part-1-secure-boot-and-dbx/ https://github.com/mjg59/mei-amt-check https://github.com/chipsec/chipsec.git https://github.com/intel/INTEL-SA-00075-Linux-Detection-And-Mitigation-Tools https://github.com/ptresearch/mmdetect https://github.com/corna/me_cleaner/
  • amt on ubuntu server agent
    1 project | /r/MeshCentral | 11 Mar 2022
    Just to add, if I run https://github.com/mjg59/mei-amt-check

INTEL-SA-00075-Linux-Detection-And-Mitigation-Tools

Posts with mentions or reviews of INTEL-SA-00075-Linux-Detection-And-Mitigation-Tools. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-07-29.
  • The Privacy, Security, & OSINT Show: 272-Processor Attacks Explained
    5 projects | /r/PrivacySecurityOSINT | 29 Jul 2022
    Paul Asadoorian https://twitter.com/securityweekly https://eclypsium.com/2022/07/26/firmware-security-realizations-part-1-secure-boot-and-dbx/ https://github.com/mjg59/mei-amt-check https://github.com/chipsec/chipsec.git https://github.com/intel/INTEL-SA-00075-Linux-Detection-And-Mitigation-Tools https://github.com/ptresearch/mmdetect https://github.com/corna/me_cleaner/

What are some alternatives?

When comparing mei-amt-check and INTEL-SA-00075-Linux-Detection-And-Mitigation-Tools you can also consider the following projects:

mmdetect - Intel ME Manufacturing Mode Detection Tools

chipsec - Platform Security Assessment Framework

me_cleaner - Tool for partial deblobbing of Intel ME/TXE firmware images