binarly-io / SupplyChainAttacksView external linksLinks
☆274Mar 24, 2025Updated 10 months ago
Alternatives and similar repositories for SupplyChainAttacks
Users that are interested in SupplyChainAttacks are comparing it to the libraries listed below
Sorting:
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆243Mar 12, 2024Updated last year
- Binarly Vulnerability Research Advisories☆185Jan 26, 2026Updated 2 weeks ago
- PCILeech HP iLO4 Service☆24Jan 9, 2019Updated 7 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Jan 31, 2019Updated 7 years ago
- ☆18Mar 26, 2024Updated last year
- Microsoft decompiled IrDA drivers☆16Apr 15, 2015Updated 10 years ago
- Recordization library☆11Jan 26, 2026Updated 2 weeks ago
- pdb's function and global vars to offset☆10Apr 11, 2023Updated 2 years ago
- iTLB multihit PoC☆42Nov 4, 2023Updated 2 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated last year
- A library and cli tool to extract HWP files.☆30Dec 1, 2025Updated 2 months ago
- UEFI and SMM Assessment Tool☆213Nov 21, 2024Updated last year
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆265Aug 31, 2022Updated 3 years ago
- ☆21Jun 20, 2025Updated 7 months ago
- IDA plugin and loader for UEFI firmware analysis and reverse engineering automation☆1,066Feb 2, 2026Updated last week
- baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability☆348Sep 27, 2023Updated 2 years ago
- AMx64 is a simulated 64-bit environment that can interpret nasm-like asm code. It allows a usage of different 64-bit registers and 64-bit…☆22Dec 22, 2023Updated 2 years ago
- Intel ME Manufacturing Mode Detection Tools☆129Oct 5, 2018Updated 7 years ago
- A DTrace on Windows Reimplementation☆369Feb 3, 2026Updated last week
- A python package that helps with analysis of MSI files☆14Mar 28, 2021Updated 4 years ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆150May 3, 2024Updated last year
- ☆189Jan 23, 2024Updated 2 years ago
- Based on minhook☆34Sep 20, 2023Updated 2 years ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97May 28, 2023Updated 2 years ago
- ☆16Sep 26, 2016Updated 9 years ago
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆57May 1, 2023Updated 2 years ago
- The script uses an Google maps API to download photos of places in the area specified by coordinates and search radius☆18Oct 16, 2023Updated 2 years ago
- Converged Security Suite for Intel & AMD platform security features☆71Jan 23, 2026Updated 3 weeks ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆144Mar 29, 2021Updated 4 years ago
- ☆109Feb 21, 2023Updated 2 years ago
- Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus)☆562Sep 12, 2023Updated 2 years ago
- Information about a signed UEFI Shell that can be used when Secure Boot is enabled.☆85Apr 27, 2021Updated 4 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆55Jun 30, 2021Updated 4 years ago
- Execute anything in a legit memory region by attacking a windows driver☆19Aug 20, 2023Updated 2 years ago
- Slides from various conference talks☆37May 30, 2023Updated 2 years ago
- ☆1,506Jul 22, 2022Updated 3 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆97Aug 27, 2022Updated 3 years ago
- HyperDeceit is the ultimate all-in-one library that emulates Hyper-V for Windows, giving you the ability to intercept and manipulate oper…☆376Jun 3, 2023Updated 2 years ago
- ☆133Jan 25, 2026Updated 2 weeks ago