BjornRuytenberg / tcfpView external linksLinks
Thunderbolt Controller Firmware Patcher.
☆68Aug 30, 2022Updated 3 years ago
Alternatives and similar repositories for tcfp
Users that are interested in tcfp are comparing it to the libraries listed below
Sorting:
- Configure SPI flash write protection.☆24May 11, 2020Updated 5 years ago
- ☆12Nov 7, 2021Updated 4 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆155May 17, 2020Updated 5 years ago
- ☆17Mar 7, 2023Updated 2 years ago
- ☆28May 8, 2023Updated 2 years ago
- ☆10Jul 8, 2022Updated 3 years ago
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w…☆10Jul 25, 2023Updated 2 years ago
- ☆19Jun 19, 2019Updated 6 years ago
- USB testing framework☆14May 22, 2023Updated 2 years ago
- The BlackAlps 2019 badge☆10Dec 4, 2021Updated 4 years ago
- This tool is the result of a reverse engineering process of the Windows service called SysMain. Time to interact with the prefetch files …☆33Nov 2, 2020Updated 5 years ago
- A simulator for the Lorenz Cipher Machine written in Python☆12Jan 26, 2024Updated 2 years ago
- ☆15Dec 27, 2020Updated 5 years ago
- IP over Fibre Channel support for Qlogic HBAs☆18Jan 23, 2017Updated 9 years ago
- iTLB multihit PoC☆42Nov 4, 2023Updated 2 years ago
- Motorola 6805/68HC05 CPU emulator core☆19Jun 10, 2024Updated last year
- NaviSecCLI for VNX Arrays.☆18Nov 30, 2021Updated 4 years ago
- ☆19Sep 8, 2022Updated 3 years ago
- ☆20Jun 10, 2023Updated 2 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 6 years ago
- Repository containing Jupyter Notebooks for working with OSQuery tables and data☆17May 8, 2020Updated 5 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Nov 27, 2018Updated 7 years ago
- A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/…☆43Dec 8, 2020Updated 5 years ago
- A UEFI Application that hooks SetVariable to allow a user-space program to access kernel memory.☆20Jun 15, 2020Updated 5 years ago
- Cryptanalysis and attack library☆22Apr 12, 2022Updated 3 years ago
- A free software library for reading Elder Scrolls Plugin (.esp) and Elder Scrolls Master (.esm) files. Use esplugin instead.☆18Feb 7, 2018Updated 8 years ago
- 编写一个简单的linux kernel rootkit☆24Aug 7, 2022Updated 3 years ago
- The Electronic Flight Bag (EFB) for Microsoft Flight Simulator 2020.☆19Nov 14, 2020Updated 5 years ago
- Experiments involving the Windows Hypervisor Platform☆23Jun 24, 2020Updated 5 years ago
- Statically assert that a program written in Rust does not panic☆23Feb 3, 2021Updated 5 years ago
- A U-Boot hacking toolkit for security researchers and tinkerers☆277Apr 11, 2023Updated 2 years ago
- Scripts to collect microcode from CPUMicrocodes Repo and to downgrade to a compatible microcode.☆22Oct 18, 2024Updated last year
- A 2-in-1 toolset of https://github.com/x0rz/EQGRP_Lost_in_Translation and https://github.com/x0rz/EQGRP☆27Aug 2, 2019Updated 6 years ago
- Conference Papers and Appendicies (USENIX Security, BlackHat, HITBSecConf, and BeVX)☆27Aug 6, 2023Updated 2 years ago
- Tool for decrypting Supermicro BMC firmware images☆33Nov 20, 2020Updated 5 years ago
- Implementation of Hamcrest for JSL.☆12Feb 6, 2023Updated 3 years ago
- Tool for decrypting and encrypting Pentium II microcode patches.☆29May 21, 2025Updated 8 months ago
- Bitpixie exploitation PoC☆94Oct 28, 2025Updated 3 months ago
- The author is lazy, nothing writen.☆29Mar 25, 2023Updated 2 years ago