NationalSecurityAgency / kmythLinks
☆97Updated 9 months ago
Alternatives and similar repositories for kmyth
Users that are interested in kmyth are comparing it to the libraries listed below
Sorting:
- ☆32Updated last year
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆163Updated last year
- Supporting Data Archives for Ghidra☆190Updated this week
- Create root and intermediate Certificate Authorities, issue user and server certificates, etc. for testing purposes.☆113Updated 7 months ago
- An official book about Rizin☆89Updated last week
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆241Updated last year
- PageBuster - dump all executable pages of packed processes.☆203Updated 4 years ago
- Proactively-secure Accumulo with Cryptographic Enforcement (PACE) adds client-side encryption and signatures to Accumulo.☆14Updated 2 years ago
- A C library and binary for generating machine code of x86_64 assembly language and executing on the fly without invoking another compiler…☆195Updated 7 months ago
- Intel Management Engine JTAG Proof of Concept☆144Updated 5 years ago
- GPU rootkit PoC by Team Jellyfish☆100Updated 10 years ago
- Psychological warfare in reverse engineering☆190Updated 7 years ago
- Architectural privilege escalation on x86☆60Updated 7 years ago
- A differential fuzzer for x86 decoders☆251Updated 11 months ago
- SkillTree☆27Updated 2 months ago
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆161Updated 3 years ago
- A list of open source reverse engineering tools with a focus on binary analysis☆221Updated last year
- The TpmTool utility is a simple cross-platform tool for accessing TPM2.0 Non-Volatile (NV) Spaces (Index Values) on compliant systems, wi…☆147Updated 4 years ago
- Ghidra analyzer for UEFI firmware.☆362Updated last year
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆235Updated 4 months ago
- Binary Ninja debugger☆265Updated this week
- Ghidra scripts for malware analysis☆100Updated last year
- Reverse engineering software using a full system simulator☆185Updated this week
- ☆49Updated 2 months ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber☆143Updated last year
- A micro hypervisor for running micro VMs☆263Updated last year
- The first analysis framework for CPU microcode☆398Updated 2 years ago
- ☆365Updated last year
- Extract BIOS firmware from Intel-based workstations and laptops☆337Updated last year