NationalSecurityAgency / kmyth
☆94Updated 5 months ago
Alternatives and similar repositories for kmyth
Users that are interested in kmyth are comparing it to the libraries listed below
Sorting:
- ☆32Updated last year
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆158Updated last year
- Supporting Data Archives for Ghidra☆182Updated last month
- Create root and intermediate Certificate Authorities, issue user and server certificates, etc. for testing purposes.☆106Updated 3 months ago
- PageBuster - dump all executable pages of packed processes.☆203Updated 4 years ago
- Proactively-secure Accumulo with Cryptographic Enforcement (PACE) adds client-side encryption and signatures to Accumulo.☆14Updated last year
- SkillTree☆27Updated 3 years ago
- Simulate realistic trajectory data seen through sporadic reporting☆155Updated 2 months ago
- An official book about Rizin☆78Updated 2 months ago
- GPU rootkit PoC by Team Jellyfish☆97Updated 10 years ago
- A C library and binary for generating machine code of x86_64 assembly language and executing on the fly without invoking another compiler…☆190Updated 3 months ago
- Malicious Microsoft Office document analyzer☆65Updated last year
- Ghidra scripts for malware analysis☆100Updated last year
- CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is a "mirror" -- p…☆129Updated 3 weeks ago
- Psychological warfare in reverse engineering☆187Updated 7 years ago
- Poseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a numbe…☆47Updated 6 years ago
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆228Updated 2 weeks ago
- Distributed P2P Data-driven Workflow Framework☆258Updated last week
- Architectural privilege escalation on x86☆60Updated 7 years ago
- ugly code to check linux kernel memory and dump some internal structures☆46Updated 5 months ago
- Side-channel file transfer between independent VMs or processes executed on the same physical host.☆49Updated 3 years ago
- Dragodis is a Python framework which allows for the creation of universal disassembler scripts.☆50Updated 10 months ago
- userland exec for Linux x86_64☆67Updated 3 years ago
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆159Updated 2 years ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆232Updated last year
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆156Updated 8 years ago
- ☆363Updated last year
- Arbitrary Speculative Code Execution with Return Instructions☆161Updated last year
- uber eXtensible Micro-Hypervisor Framework☆31Updated 10 months ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year