daveti / usbfilter
A USB layer firewall for the Linux kernel
☆35Updated 6 years ago
Alternatives and similar repositories for usbfilter:
Users that are interested in usbfilter are comparing it to the libraries listed below
- lte security☆41Updated 9 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Updated 10 years ago
- Firmware analysis gone wild.☆42Updated 10 years ago
- ☆24Updated 9 years ago
- Slides, Papers, Links to CVEs and advisories☆78Updated 7 years ago
- Fuzzer☆43Updated 10 years ago
- hid emulation tools for the usbarmory☆68Updated 8 years ago
- repository with additional materials and source code☆30Updated 8 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆52Updated 10 years ago
- Automatically compiled list of file hashes associated with the IoT malware Hajime and its components.☆14Updated 6 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- ☆38Updated 9 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 8 years ago
- ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.☆67Updated 11 years ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆29Updated 8 years ago
- Automatically exported from code.google.com/p/timing-attestation☆13Updated 9 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 8 years ago
- please use https://github.com/fireeye/vivisect instead☆16Updated 7 months ago
- Some scripts to create a reproducible build for grsecurity☆30Updated 7 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆54Updated 8 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 9 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆28Updated 10 years ago
- Tools for reverse engineering the Utimaco Firmware☆44Updated 8 years ago
- It contains hardenedlinux community documentation.☆60Updated last year
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆66Updated 9 years ago
- An EFI image parser and dissector☆50Updated 12 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆142Updated 10 years ago
- A library for efficient interception of established TCP connections☆19Updated 9 years ago