NationalSecurityAgency / kmythLinks
☆96Updated 7 months ago
Alternatives and similar repositories for kmyth
Users that are interested in kmyth are comparing it to the libraries listed below
Sorting:
- ☆32Updated last year
- Create root and intermediate Certificate Authorities, issue user and server certificates, etc. for testing purposes.☆106Updated 4 months ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆159Updated last year
- Supporting Data Archives for Ghidra☆186Updated this week
- SkillTree☆27Updated 3 years ago
- PageBuster - dump all executable pages of packed processes.☆203Updated 4 years ago
- Psychological warfare in reverse engineering☆187Updated 7 years ago
- An official book about Rizin☆79Updated 4 months ago
- Blocks drivers from loading by using a name collision technique. #nsacyber☆49Updated 7 years ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆237Updated last year
- The TpmTool utility is a simple cross-platform tool for accessing TPM2.0 Non-Volatile (NV) Spaces (Index Values) on compliant systems, wi…☆145Updated 3 years ago
- Distributed P2P Data-driven Workflow Framework☆261Updated this week
- Architectural privilege escalation on x86☆60Updated 7 years ago
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆190Updated last week
- A list of open source reverse engineering tools with a focus on binary analysis☆214Updated last year
- CITL's static analysis engine for native code artifacts☆20Updated 4 years ago
- Ghidra analyzer for UEFI firmware.☆350Updated last year
- Assesses CPU security of embedded devices. #nsacyber☆139Updated 9 years ago
- Dragodis is a Python framework which allows for the creation of universal disassembler scripts.☆51Updated last year
- GPU rootkit PoC by Team Jellyfish☆98Updated 10 years ago
- capa explorer for Cutter.☆46Updated 3 years ago
- Intel Management Engine JTAG Proof of Concept☆141Updated 5 years ago
- Ghidra utilities for analyzing PC firmware☆435Updated 5 months ago
- Ghidra scripts for malware analysis☆101Updated last year
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆44Updated 3 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆56Updated 6 years ago
- Extract BIOS firmware from Intel-based workstations and laptops☆335Updated last year
- SkillTree skills-client-examples☆32Updated last month
- Function signature matching and signature generation plugin for Binary Ninja☆70Updated 9 months ago
- Ghidra Client/Server Docker Image☆221Updated this week