NationalSecurityAgency / kmythLinks
☆99Updated last year
Alternatives and similar repositories for kmyth
Users that are interested in kmyth are comparing it to the libraries listed below
Sorting:
- ☆34Updated last year
- Create root and intermediate Certificate Authorities, issue user and server certificates, etc. for testing purposes.☆113Updated 10 months ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆163Updated last year
- An official book about Rizin☆92Updated 2 weeks ago
- PageBuster - dump all executable pages of packed processes.☆204Updated 4 years ago
- GPU rootkit PoC by Team Jellyfish☆100Updated 10 years ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆242Updated last year
- Supporting Data Archives for Ghidra☆197Updated last week
- Architectural privilege escalation on x86☆60Updated 7 years ago
- Distributed P2P Data-driven Workflow Framework☆269Updated this week
- Intel Management Engine JTAG Proof of Concept☆145Updated 5 years ago
- A C library and binary for generating machine code of x86_64 assembly language and executing on the fly without invoking another compiler…☆198Updated 10 months ago
- A micro hypervisor for running micro VMs☆265Updated last year
- The TpmTool utility is a simple cross-platform tool for accessing TPM2.0 Non-Volatile (NV) Spaces (Index Values) on compliant systems, wi…☆147Updated 4 years ago
- Blocks drivers from loading by using a name collision technique. #nsacyber☆50Updated 7 years ago
- PT_NOTE to PT_LOAD x64 ELF infector written in Assembly☆49Updated 4 years ago
- Proactively-secure Accumulo with Cryptographic Enforcement (PACE) adds client-side encryption and signatures to Accumulo.☆15Updated 2 years ago
- ☆56Updated 11 months ago
- SkillTree☆28Updated 5 months ago
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆159Updated 3 years ago
- Data to test capa's code and rules.☆46Updated last week
- ☆52Updated 5 months ago
- C++ Self Modifying Code (Self Assembing/Disassembling)☆73Updated 5 years ago
- Psychological warfare in reverse engineering☆198Updated 7 years ago
- A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber☆144Updated last year
- fanny.bmp cleaned MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆46Updated 5 months ago
- Poseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a numbe…☆47Updated 6 years ago
- bareflank based hypervisor with guest support☆61Updated 5 years ago
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆203Updated this week
- A differential fuzzer for x86 decoders☆252Updated last year