BjornRuytenberg / spycheck-linuxLinks
Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.
☆153Updated 5 years ago
Alternatives and similar repositories for spycheck-linux
Users that are interested in spycheck-linux are comparing it to the libraries listed below
Sorting:
- Tool for decrypting the firmware files for Samsung SSDs☆225Updated 4 years ago
- TPM-Fail Attack code & data☆122Updated 2 years ago
- Artifacts for the USENIX publication.☆58Updated 5 years ago
- ☆222Updated 5 years ago
- RIDL test suite and exploits☆357Updated 5 years ago
- Vulnerability checker for Callstranger (CVE-2020-12695)☆402Updated 4 years ago
- BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials☆68Updated 5 years ago
- Qubes containerization on Windows☆129Updated 4 years ago
- ☆130Updated 6 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- A low pin count sniffer for ICEStick - targeting TPM chips☆168Updated 5 years ago
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆49Updated 6 months ago
- ☆252Updated 4 years ago
- CCC: Analyse des Staatstrojaners "FinSpy" für Android☆115Updated 5 years ago
- Intel ME Manufacturing Mode Detection Tools☆127Updated 7 years ago
- Disabling kernel lockdown on Ubuntu without physical access☆81Updated 2 years ago
- Formerly private repository for discussion, knowledge- and code-sharing around new Unifying vulns, as announced on Twitter☆159Updated 4 years ago
- ☆196Updated 4 years ago
- Tear the firmware apart with your bare hands;-)☆192Updated 3 months ago
- ☆29Updated 6 years ago
- ☆293Updated 4 years ago
- It contains hardenedlinux community documentation.☆60Updated 2 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆241Updated last year
- Panic button for protection against cold boot attacks☆145Updated 3 years ago
- out-of-tree kernel {module, exploit} development tool☆230Updated 11 months ago
- Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]☆186Updated 3 years ago
- ☆104Updated 3 years ago
- CLIP OS product recipes☆66Updated 4 years ago
- An extensively configurable tool providing a summary of the changes between two files or directories, ignoring all the fluff you don't ca…☆203Updated 3 years ago