BjornRuytenberg / spycheck-linuxLinks
Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.
☆153Updated 5 years ago
Alternatives and similar repositories for spycheck-linux
Users that are interested in spycheck-linux are comparing it to the libraries listed below
Sorting:
- Tool for decrypting the firmware files for Samsung SSDs☆224Updated 4 years ago
- RIDL test suite and exploits☆357Updated 5 years ago
- ☆222Updated 5 years ago
- Artifacts for the USENIX publication.☆58Updated 5 years ago
- TPM-Fail Attack code & data☆122Updated 2 years ago
- Qubes containerization on Windows☆129Updated 4 years ago
- BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials☆67Updated 5 years ago
- Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.☆54Updated 8 years ago
- CCC: Analyse des Staatstrojaners "FinSpy" für Android☆115Updated 5 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- A low pin count sniffer for ICEStick - targeting TPM chips☆169Updated 5 years ago
- ☆196Updated 4 years ago
- trustor (PoC)☆25Updated 3 years ago
- ☆104Updated 3 years ago
- ☆129Updated 6 years ago
- Intel Management Engine JTAG Proof of Concept☆144Updated 5 years ago
- USB armory Debian base image☆82Updated last month
- An extensively configurable tool providing a summary of the changes between two files or directories, ignoring all the fluff you don't ca…☆202Updated 3 years ago
- out-of-tree kernel {module, exploit} development tool☆230Updated 10 months ago
- TPM vulnerability checking tool for CVE-2018-6622. This tool will be published at Black Hat Asia 2019 and Black Hat Europe 2019☆106Updated 3 years ago
- Disabling kernel lockdown on Ubuntu without physical access☆81Updated 2 years ago
- ☆252Updated 4 years ago
- PageBuster - dump all executable pages of packed processes.☆203Updated 4 years ago
- Chrome extension to alert and possibly block IDN/Unicode websites and zero-day phishing websites using AI and Computer Vision.☆119Updated 7 years ago
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆49Updated 5 months ago
- Intel ME Manufacturing Mode Detection Tools☆127Updated 7 years ago
- TRRespass☆125Updated 4 years ago
- Formerly private repository for discussion, knowledge- and code-sharing around new Unifying vulns, as announced on Twitter☆159Updated 4 years ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆241Updated last year
- CVE-2018-20377; 20575; 20576; 20577 Multiple security vulnerabilities affecting latest firmware release on ORANGE Livebox modems.☆74Updated last year