daveti / usbfilterLinks
A USB layer firewall for the Linux kernel
☆35Updated 7 years ago
Alternatives and similar repositories for usbfilter
Users that are interested in usbfilter are comparing it to the libraries listed below
Sorting:
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆57Updated 7 years ago
- Universal script packer-- transforms any type of script into a protected ELF executable, encrypted with anti-debugging.☆106Updated 11 years ago
- X41 Smartcard Fuzzer☆119Updated 6 years ago
- ☆84Updated 7 years ago
- lte security☆41Updated 9 years ago
- Tools for reverse engineering the Utimaco Firmware☆44Updated 8 years ago
- ☆25Updated 10 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 9 years ago
- Replay HTTP and HTTPS requests from a PCAP based on TLS Master Secrets.☆95Updated 3 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- An EFI image parser and dissector☆52Updated 12 years ago
- LPE exploits for Secret Net and Secret Net Studio☆51Updated 9 years ago
- hid emulation tools for the usbarmory☆68Updated 8 years ago
- A boot record parser that identifies known good signatures for MBR, VBR and IPL.☆96Updated 9 months ago
- Platform Firmware Auditing Tool☆131Updated 7 years ago
- Cross compiling Utils (ARMEB, ARMEL, MIPS, MIPSEL)☆80Updated 8 years ago
- Implementation of the SMM rootkit "The Watcher"☆128Updated 3 years ago
- The Alternative Fileless File System☆57Updated 6 years ago
- Broadpwn bug (CVE-2017-9417)☆52Updated 8 years ago
- Some scripts to create a reproducible build for grsecurity☆31Updated 8 years ago
- Slides, Papers, Links to CVEs and advisories☆78Updated 8 years ago
- Tools for viewing and extracting HDD firmware files☆76Updated 11 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Binary and Directory tree comparison tool using Fuzzy Hashing☆84Updated 10 years ago
- Set of python scripts to analyse PE32/PE64 binaries and to extract VB 5/6 headers and Visual Basic p-code functions.☆48Updated 10 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆145Updated 9 years ago
- ☆118Updated 4 years ago
- ☆57Updated 11 years ago
- It contains hardenedlinux community documentation.☆60Updated 2 years ago