BjornRuytenberg / spycheck-linux
Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.
☆150Updated 4 years ago
Alternatives and similar repositories for spycheck-linux:
Users that are interested in spycheck-linux are comparing it to the libraries listed below
- Tool for decrypting the firmware files for Samsung SSDs☆213Updated 3 years ago
- Artifacts for the USENIX publication.☆57Updated 5 years ago
- Tool for complete hardening of Linux boot chain with UEFI Secure Boot☆73Updated 4 years ago
- A pam module written in C for duress codes in linux authentication☆147Updated 4 years ago
- ☆251Updated 4 years ago
- TPM-Fail Attack code & data☆120Updated last year
- Intel ME Manufacturing Mode Detection Tools☆125Updated 6 years ago
- Qubes containerization on Windows☆130Updated 3 years ago
- Panic button for protection against cold boot attacks☆140Updated 2 years ago
- RIDL test suite and exploits☆353Updated 4 years ago
- TCP ISN CPU Information Leak Protection. TCP Initial Sequence Numbers Randomization to prevent TCP ISN based CPU Information Leaks.☆45Updated this week
- Disabling kernel lockdown on Ubuntu without physical access☆78Updated 2 years ago
- Tear the firmware apart with your bare hands;-)☆180Updated 3 years ago
- out-of-tree kernel {module, exploit} development tool☆224Updated last month
- New TLS Padding Oracles☆124Updated last year
- Keystroke injection vulnerabilities in wireless presentation clickers☆97Updated 5 years ago
- trustor (PoC)☆25Updated 3 years ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆230Updated 10 months ago
- Qubes component: antievilmaid☆146Updated 5 months ago
- It contains hardenedlinux community documentation.☆60Updated last year
- BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials☆64Updated 4 years ago
- CERT Tapioca for MITM network analysis☆182Updated 8 months ago
- Obscurix is a live operating system based on Arch Linux that is heavily configured for privacy, security and anonymity. It safely force…☆115Updated 4 years ago
- TPM vulnerability checking tool for CVE-2018-6622. This tool will be published at Black Hat Asia 2019 and Black Hat Europe 2019☆102Updated 2 years ago
- Linux i386 tool to load and execute ME modules.☆130Updated 3 years ago
- ☆123Updated 5 years ago
- ☆220Updated 5 years ago
- Chrome extension to alert and possibly block IDN/Unicode websites and zero-day phishing websites using AI and Computer Vision.☆116Updated 6 years ago
- Hardened kernel generation - Deprecated☆49Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 6 years ago