NationalSecurityAgency / kmyth
☆91Updated 4 months ago
Alternatives and similar repositories for kmyth:
Users that are interested in kmyth are comparing it to the libraries listed below
- ☆32Updated 10 months ago
- Create root and intermediate Certificate Authorities, issue user and server certificates, etc. for testing purposes.☆103Updated last month
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆158Updated 10 months ago
- Proactively-secure Accumulo with Cryptographic Enforcement (PACE) adds client-side encryption and signatures to Accumulo.☆14Updated last year
- Supporting Data Archives for Ghidra☆180Updated last week
- An official book about Rizin☆76Updated last month
- GPU rootkit PoC by Team Jellyfish☆97Updated 9 years ago
- Psychological warfare in reverse engineering☆187Updated 7 years ago
- PageBuster - dump all executable pages of packed processes.☆202Updated 3 years ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆230Updated last year
- Side-channel file transfer between independent VMs or processes executed on the same physical host.☆49Updated 3 years ago
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆43Updated 3 years ago
- Architectural privilege escalation on x86☆60Updated 7 years ago
- Ghidra scripts for malware analysis☆92Updated last year
- Intel Management Engine JTAG Proof of Concept☆142Updated 4 years ago
- UEFI and SMM Assessment Tool☆183Updated 4 months ago
- Binary Protocol Differ☆117Updated 4 years ago
- ugly code to check linux kernel memory and dump some internal structures☆46Updated 4 months ago
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆157Updated 2 years ago
- The first analysis framework for CPU microcode☆389Updated 2 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- Cutter Instruction Reference Plugin☆28Updated 4 years ago
- A micro hypervisor for running micro VMs☆256Updated 7 months ago
- WiiBin is a framework to determine architecture of an unknown binary and locate opcode sections within the same binary via supervised mac…☆20Updated 9 months ago
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆183Updated this week
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆227Updated 2 months ago
- Malicious Microsoft Office document analyzer☆65Updated last year
- Blocks drivers from loading by using a name collision technique. #nsacyber☆45Updated 7 years ago
- CLI program to calculate the entropy of files☆71Updated last year
- A bare minimum hypervisor on AMD and Intel processors for learners.☆258Updated last month