NationalSecurityAgency / kmythLinks
☆94Updated 6 months ago
Alternatives and similar repositories for kmyth
Users that are interested in kmyth are comparing it to the libraries listed below
Sorting:
- ☆32Updated last year
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆159Updated last year
- Supporting Data Archives for Ghidra☆184Updated last week
- Create root and intermediate Certificate Authorities, issue user and server certificates, etc. for testing purposes.☆106Updated 4 months ago
- SkillTree☆27Updated 3 years ago
- GPU rootkit PoC by Team Jellyfish☆97Updated 10 years ago
- An official book about Rizin☆78Updated 3 months ago
- IPC scripts for access to Intel CRBUS☆118Updated 3 years ago
- Architectural privilege escalation on x86☆60Updated 7 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆162Updated last year
- ☆78Updated 4 years ago
- Intel Management Engine JTAG Proof of Concept☆141Updated 5 years ago
- A C library and binary for generating machine code of x86_64 assembly language and executing on the fly without invoking another compiler…☆189Updated 3 months ago
- Psychological warfare in reverse engineering☆186Updated 7 years ago
- Ghidra scripts for malware analysis☆101Updated last year
- Dragodis is a Python framework which allows for the creation of universal disassembler scripts.☆50Updated 11 months ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆235Updated last year
- CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is a "mirror" -- p…☆129Updated last month
- Provides io.ReadWriter interface for a PCIe screamer device☆31Updated 4 years ago
- PageBuster - dump all executable pages of packed processes.☆203Updated 4 years ago
- GLM uCode dumps☆289Updated 5 years ago
- A differential fuzzer for x86 decoders☆250Updated 7 months ago
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆189Updated last week
- Blocks drivers from loading by using a name collision technique. #nsacyber☆49Updated 7 years ago
- ☆113Updated last year
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆229Updated last month
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆156Updated 8 years ago
- A library for building efficient set-membership filters and dictionaries based on the Satisfiability problem.☆34Updated 2 years ago
- Automatically generate AV byte signatures from sets of similar binaries.☆273Updated 5 months ago
- Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives☆97Updated 8 years ago