NationalSecurityAgency / kmyth
☆92Updated 4 months ago
Alternatives and similar repositories for kmyth:
Users that are interested in kmyth are comparing it to the libraries listed below
- ☆32Updated 11 months ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆158Updated 11 months ago
- Create root and intermediate Certificate Authorities, issue user and server certificates, etc. for testing purposes.☆105Updated 2 months ago
- Supporting Data Archives for Ghidra☆181Updated last week
- Proactively-secure Accumulo with Cryptographic Enforcement (PACE) adds client-side encryption and signatures to Accumulo.☆14Updated last year
- Distributed P2P Data-driven Workflow Framework☆257Updated this week
- PageBuster - dump all executable pages of packed processes.☆202Updated 4 years ago
- GPU rootkit PoC by Team Jellyfish☆97Updated 9 years ago
- Architectural privilege escalation on x86☆60Updated 7 years ago
- Ghidra scripts for malware analysis☆93Updated last year
- Malicious Microsoft Office document analyzer☆65Updated last year
- Psychological warfare in reverse engineering☆187Updated 7 years ago
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆157Updated 2 years ago
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆43Updated 3 years ago
- Poseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a numbe…☆47Updated 6 years ago
- The TpmTool utility is a simple cross-platform tool for accessing TPM2.0 Non-Volatile (NV) Spaces (Index Values) on compliant systems, wi…☆145Updated 3 years ago
- Lightweight type-1 hypervisor offering a foundation for building advanced security-focused functionality.☆257Updated 3 months ago
- A C library and binary for generating machine code of x86_64 assembly language and executing on the fly without invoking another compiler…☆190Updated 2 months ago
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆188Updated this week
- An official book about Rizin☆78Updated 2 months ago
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆154Updated 7 years ago
- Intel Management Engine JTAG Proof of Concept☆142Updated 4 years ago
- Side-channel file transfer between independent VMs or processes executed on the same physical host.☆49Updated 3 years ago
- A list of open source reverse engineering tools with a focus on binary analysis☆205Updated last year
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆231Updated last year
- CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is a "mirror" -- p…☆128Updated this week
- Dragodis is a Python framework which allows for the creation of universal disassembler scripts.☆50Updated 10 months ago
- BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)☆125Updated 3 years ago
- PT_NOTE to PT_LOAD x64 ELF infector written in Assembly☆44Updated 3 years ago
- A micro hypervisor for running micro VMs☆255Updated 8 months ago