VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/defeating-secure-boot-with-symlink-attacks.html
☆14Aug 11, 2020Updated 5 years ago
Alternatives and similar repositories for symlink-secure-boot-vm
Users that are interested in symlink-secure-boot-vm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- USB device fuzzing on Android Phone☆34Oct 16, 2021Updated 4 years ago
- Mirror to the official CH341A drivers and used software, along with the documentation.☆14Aug 26, 2022Updated 3 years ago
- Bypass TPM and SecureBoot Check in Windows 11 Installation.☆11Mar 9, 2023Updated 3 years ago
- ☆14May 19, 2019Updated 6 years ago
- Simple PoC for a bootkit written as a UEFI Option ROM Driver☆11Oct 5, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Opensource repository for DVID V2☆16Jun 3, 2025Updated 9 months ago
- ECED440 Computer Security☆11Mar 17, 2026Updated last week
- ☆54Oct 15, 2018Updated 7 years ago
- ☆11Dec 21, 2021Updated 4 years ago
- My solutions to RingZer0 CTF programming challenges☆15Aug 15, 2016Updated 9 years ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Jul 13, 2022Updated 3 years ago
- My Material for the HITB presentation☆35May 31, 2020Updated 5 years ago
- ☆14Sep 28, 2023Updated 2 years ago
- Dumping firmware from an ID115 fitness band☆14Jun 16, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆31Mar 11, 2021Updated 5 years ago
- Python Package for burprestapi☆17Dec 27, 2019Updated 6 years ago
- Abstraction layer for Xilinx FPGAs☆15Aug 9, 2019Updated 6 years ago
- A bunch of reverse engineering Binaries dedicated to practice.☆17Feb 14, 2026Updated last month
- Inspired by gowitness and EyeWitness☆15Mar 11, 2025Updated last year
- The Dumb Network Fuzzer☆21Jul 18, 2023Updated 2 years ago
- 🕶 Cross-platform network interface command-line utility.☆18Jan 23, 2023Updated 3 years ago
- firmwalker加强版,增加了一些信息泄露关键字。☆19Mar 1, 2023Updated 3 years ago
- OWASP Foundation Web Respository☆10Mar 14, 2026Updated last week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- IoT Hacking Kit Details☆19Aug 19, 2025Updated 7 months ago
- This is a tool to instantly test if an application handles SSL certificates the way it is supposed to.☆25Mar 17, 2023Updated 3 years ago
- MQTT exploit and Pentesting guide for penetration tester☆27Nov 24, 2023Updated 2 years ago
- ☆15Jul 21, 2022Updated 3 years ago
- ☆35Mar 20, 2021Updated 5 years ago
- A simple tool to upload data to the RAM of linux systems running the U-Boot bootloader☆23Sep 24, 2020Updated 5 years ago
- This is a working copy of the OWASP Project Handbook and is the draft where changes are made before publishing a final version on the OWA…☆19Feb 22, 2017Updated 9 years ago
- Agentic C2-style MCP server for Frida instrumentation on rooted Android and jailbroken iOS.☆44Mar 18, 2026Updated last week
- ☆22Mar 3, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Stack-based virtual machine written in C☆24Jan 3, 2025Updated last year
- A U-Boot hacking toolkit for security researchers and tinkerers☆36Jan 10, 2025Updated last year
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- Tools for timing attacks☆19Oct 19, 2015Updated 10 years ago
- vbox-img Docker image☆24Feb 3, 2016Updated 10 years ago
- A repository for my conference presentations☆35Feb 18, 2020Updated 6 years ago
- Persistent & Undetectable Malware Backdoor☆28May 8, 2024Updated last year