NationalSecurityAgency / kmythLinks
☆99Updated last year
Alternatives and similar repositories for kmyth
Users that are interested in kmyth are comparing it to the libraries listed below
Sorting:
- ☆34Updated last year
- Create root and intermediate Certificate Authorities, issue user and server certificates, etc. for testing purposes.☆114Updated 11 months ago
- Supporting Data Archives for Ghidra☆201Updated last week
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆242Updated last year
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆163Updated last year
- PageBuster - dump all executable pages of packed processes.☆204Updated 4 years ago
- Intel Management Engine JTAG Proof of Concept☆145Updated 5 years ago
- An official book about Rizin☆91Updated this week
- Architectural privilege escalation on x86☆61Updated 7 years ago
- GPU rootkit PoC by Team Jellyfish☆100Updated 10 years ago
- Proactively-secure Accumulo with Cryptographic Enforcement (PACE) adds client-side encryption and signatures to Accumulo.☆15Updated 2 years ago
- A C library and binary for generating machine code of x86_64 assembly language and executing on the fly without invoking another compiler…☆200Updated 11 months ago
- ☆113Updated 2 years ago
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆158Updated 3 years ago
- Modify a message to have a desired CRC signature.☆126Updated 4 years ago
- Psychological warfare in reverse engineering☆201Updated 7 years ago
- TPM-Fail Attack code & data☆124Updated 2 years ago
- The first analysis framework for CPU microcode☆412Updated 2 years ago
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆242Updated 8 months ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆115Updated 2 years ago
- IPC scripts for access to Intel CRBUS☆120Updated 4 years ago
- The TpmTool utility is a simple cross-platform tool for accessing TPM2.0 Non-Volatile (NV) Spaces (Index Values) on compliant systems, wi…☆148Updated 4 years ago
- ☆53Updated last week
- A differential fuzzer for x86 decoders☆260Updated last year
- Extract BIOS firmware from Intel-based workstations and laptops☆341Updated last year
- Arbitrary Speculative Code Execution with Return Instructions☆176Updated 2 years ago
- Ghidra scripts for malware analysis☆101Updated 2 years ago
- A list of open source reverse engineering tools with a focus on binary analysis☆233Updated last year
- A binary visualization tool to aid with reverse engineering and malware detection similar to Cantor.Dust☆132Updated 3 years ago
- Poseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a numbe…☆47Updated 6 years ago