Unicorn-Bios : Basic BIOS Emulator for Unicorn Engine

Unicorn-Bios is a basic BIOS emulator/debugger for Unicorn Engine.

Usage

Usage: unicorn-bios [OPTIONS] BOOT_IMG

Options:
–help / -h: Displays help.
–memory / -m: The amount of memory to allocate for the virtual machine
(in megabytes). Defaults to 64MB, minimum 2MB.
–break / -b Breaks on a specific address.
–break-int: Breaks on interrupt calls.
–break-iret: Breaks on interrupt returns.
–trap: Raises a trap when breaking.
–debug-video: Turns on debug output for video services.
–single-step: Breaks on every instruction.
–no-ui: Don’t start the user interface (output will be displayed to stdout, debug info to stderr).
–no-colors: Don’t use colors.

Also Read : SIEM – A Beginner’s Guide to Security Information and Event Management Tools

Installation

brew install –HEAD macmade/tap/unicorn-bios

License

unicorn-bios is released under the terms of the MIT license.

Repository Infos

Owner: Jean-David Gadina – XS-Labs
Web: www.xs-labs.com
Blog: www.noxeos.com
Twitter: @macmade
GitHub: github.com/macmade
LinkedIn: ch.linkedin.com/in/macmade/
StackOverflow: stackoverflow.com/users/182676/macmade

R K

Recent Posts

Playwright-MCP : A Powerful Tool For Browser Automation

Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…

2 weeks ago

JBDev : A Tool For Jailbreak And TrollStore Development

JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…

2 weeks ago

Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs

The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…

2 weeks ago

Nuclei-Templates-Labs : A Hands-On Security Testing Playground

Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…

2 weeks ago

SSH-Stealer : The Stealthy Threat Of Advanced Credential Theft

SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…

2 weeks ago

ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM

Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…

2 weeks ago