Revolutionize your code reviews with AI. CodeRabbit offers PR summaries, code walkthroughs, 1-click suggestions, and AST-based analysis. Boost productivity and code quality across all major languages with each PR. Learn more →
Top 13 C Bio Projects
-
Project mention: How to Set Up a Local Ubuntu Server to Host Ollama Models with a WebUI | dev.to | 2024-12-14
Use tools like Rufus (Windows) or dd (Linux/Mac) to create a bootable USB drive:
-
CodeRabbit
CodeRabbit: AI Code Reviews for Developers. Revolutionize your code reviews with AI. CodeRabbit offers PR summaries, code walkthroughs, 1-click suggestions, and AST-based analysis. Boost productivity and code quality across all major languages with each PR.
-
Project mention: Release Cosmopolitan v4.0.0 · jart/cosmopolitan | news.ycombinator.com | 2025-01-23
-
coreboot
Read-only mirror of https://review.coreboot.org/coreboot.git. Synced every hour. We don't handle Pull Requests.
Project mention: Authenticated Boot and Disk Encryption on Linux | news.ycombinator.com | 2024-09-03> Show me a FLOSS implementation of this standard and you will have a point
I've had a point from my first comment and it hasn't changed in validity. It's just taking time to convince you, but I think I'm making progress :)
I referenced several open implementations in my last reply, an a cursory search reveals more [1] [2]. Besides, this still doesn't help you trust the hardware, even if that hardware is entirely open like some sort of RISC chip. Can you verify every step in the supply chain? At every stage of assembly? No? Or, assuming a trusted device, can you be 100% confident something wasn't added, a simple keylogger? Most keyboards can be removed from laptops without leaving a trace, so can screen casings, speakers, batteries, etc. Plenty of places to hide something tiny.
> At the moment, I would have to trust a megacorporation obeying NSA,
That's less likely than the software you use having been compromised, for example by introducing an obfuscated bug, or MitMing as you perform a software update (many software update mechanisms have notoriously weak security, search some defcon talks on the subject).
> Your threat model may vary.
No, what I'm saying applies to all threat models, and I challenge you to name one to disprove that.
Secure boot is an open standard and can be implemented in a trustworthy and secure way, you just need to put in the work to do so. It's entirely possible to do so.
Of course if you are putting in all that work, if you are that at risk, you would need to switch your software stack entirely as well and use something like seL4 as a starting point.
[1] https://github.com/prplfoundation/prpl-secure-boot
[2] https://www.coreboot.org/
-
Project mention: Limine – Modern, advanced, portable, multiprotocol bootloader and boot manager | news.ycombinator.com | 2025-03-12
-
-
-
-
InfluxDB
InfluxDB high-performance time series database. Collect, organize, and act on massive volumes of high-resolution data to power real-time intelligent systems.
-
-
-
-
-
PS2Ident
PS2Ident is an identification tool that allows dumps of a PlayStation 2 console's ROM chips and MECHACON NVRAM to be made. It will also gather data from the console
-
AMI_BIOS_CodeInjection
A simple tutorial on how to do reverse engineer and code injection on AMI BIOSes (Legacy)
C Bios discussion
C Bios related posts
-
Limine – Modern, advanced, portable, multiprotocol bootloader and boot manager
-
A Linux kernel syscall implementation tracker
-
Limine: Legacy-free portable bootloader, supports both Linux and hobby kernels
-
It's far from clear how grub package updates work on Ubuntu
-
Limine a dog with fleas just died
-
Problem loading GDT in a x86-64 kernel
-
Greatest “Classic” Mac Laptop: Powerbook G3 Pismo
-
A note from our sponsor - CodeRabbit
coderabbit.ai | 25 Apr 2025
Index
What are some of the best open-source Bio projects in C? This list will help you:
# | Project | Stars |
---|---|---|
1 | Rufus | 31,021 |
2 | cosmopolitan | 19,239 |
3 | coreboot | 2,337 |
4 | limine | 2,151 |
5 | skulls | 750 |
6 | DreamShell | 475 |
7 | bread | 296 |
8 | libsmbios | 198 |
9 | yoga-bios-unlock | 109 |
10 | coreboot | 95 |
11 | RasPiPicoSDK-PicoBiosPostCodeReader | 73 |
12 | PS2Ident | 44 |
13 | AMI_BIOS_CodeInjection | 27 |