NationalSecurityAgency / kmyth
☆92Updated 2 months ago
Alternatives and similar repositories for kmyth:
Users that are interested in kmyth are comparing it to the libraries listed below
- ☆32Updated 9 months ago
- Create root and intermediate Certificate Authorities, issue user and server certificates, etc. for testing purposes.☆105Updated 2 weeks ago
- Supporting Data Archives for Ghidra☆179Updated this week
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆158Updated 9 months ago
- SkillTree☆26Updated 2 years ago
- GPU rootkit PoC by Team Jellyfish☆96Updated 9 years ago
- PageBuster - dump all executable pages of packed processes.☆202Updated 3 years ago
- Blocks drivers from loading by using a name collision technique. #nsacyber☆45Updated 7 years ago
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆42Updated 3 years ago
- The TpmTool utility is a simple cross-platform tool for accessing TPM2.0 Non-Volatile (NV) Spaces (Index Values) on compliant systems, wi…☆140Updated 3 years ago
- Ghidra scripts for malware analysis☆91Updated last year
- A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber☆135Updated last year
- Psychological warfare in reverse engineering☆186Updated 6 years ago
- Side-channel file transfer between independent VMs or processes executed on the same physical host.☆49Updated 3 years ago
- Architectural privilege escalation on x86☆60Updated 6 years ago
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆156Updated 2 years ago
- Intel Management Engine JTAG Proof of Concept☆141Updated 4 years ago
- ugly code to check linux kernel memory and dump some internal structures☆46Updated 3 months ago
- Find RSA primes in files☆20Updated 2 years ago
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆184Updated last week
- fanny.bmp MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆39Updated 10 months ago
- A library for building efficient set-membership filters and dictionaries based on the Satisfiability problem.☆33Updated 2 years ago
- A C library and binary for generating machine code of x86_64 assembly language and executing on the fly without invoking another compiler…☆191Updated last week
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆105Updated last year
- A micro hypervisor for running micro VMs☆257Updated 5 months ago
- ☆113Updated last year
- ☆105Updated 5 years ago
- Ghidra utilities for analyzing PC firmware☆413Updated last month
- userland exec for Linux x86_64☆66Updated 2 years ago
- The research UEFI hypervisor that supports booting an operating system.☆587Updated 6 months ago