BjornRuytenberg / spycheck-linux
Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.
☆150Updated 5 years ago
Alternatives and similar repositories for spycheck-linux
Users that are interested in spycheck-linux are comparing it to the libraries listed below
Sorting:
- Tool for decrypting the firmware files for Samsung SSDs☆221Updated 4 years ago
- TPM-Fail Attack code & data☆121Updated 2 years ago
- Artifacts for the USENIX publication.☆58Updated 5 years ago
- ☆251Updated 4 years ago
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆48Updated last month
- Tool for complete hardening of Linux boot chain with UEFI Secure Boot☆74Updated 4 years ago
- PageBuster - dump all executable pages of packed processes.☆203Updated 4 years ago
- trustor (PoC)☆25Updated 3 years ago
- A simple embedded Linux backdoor.☆199Updated 4 years ago
- This repository contains the tools we used in our research on the Google Titan M chip☆187Updated 2 years ago
- Disabling kernel lockdown on Ubuntu without physical access☆79Updated 2 years ago
- Tear the firmware apart with your bare hands;-)☆188Updated 3 years ago
- collection of verified Linux kernel exploits☆187Updated 4 years ago
- Formerly private repository for discussion, knowledge- and code-sharing around new Unifying vulns, as announced on Twitter☆158Updated 3 years ago
- Intel Management Engine JTAG Proof of Concept☆142Updated 4 years ago
- Platform Firmware Auditing Tool☆131Updated 6 years ago
- Pattern Extractor for Obfuscated Code☆298Updated 3 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- Scripts to slightly improve the security of the Linux boot process with UEFI Secure Boot and TPM support☆277Updated 2 years ago
- Decept Network Protocol Proxy☆276Updated 2 years ago
- ☆221Updated 5 years ago
- ☆126Updated 6 years ago
- A simple LD_PRELOAD library to disable SSL certificate verification. Inspired by libeatmydata.☆179Updated 6 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- An experimental script PoC for Kr00k vulnerability (CVE-2019-15126)☆62Updated 3 years ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆232Updated last year
- Intel Management Engine JTAG Proof of Concept☆520Updated 4 years ago
- A script that automates generation of OpenSSL reverse shells☆300Updated 4 years ago
- Encrypted exploit delivery for the masses☆267Updated 5 years ago
- out-of-tree kernel {module, exploit} development tool☆227Updated 5 months ago