daveti / usbfilterLinks
A USB layer firewall for the Linux kernel
☆37Updated 7 years ago
Alternatives and similar repositories for usbfilter
Users that are interested in usbfilter are comparing it to the libraries listed below
Sorting:
- Tools for viewing and extracting HDD firmware files☆78Updated 11 years ago
- Tools for reverse engineering the Utimaco Firmware☆44Updated 9 years ago
- SIGSTOPing ELF binaries since 0x7E1☆57Updated last year
- An EFI image parser and dissector☆52Updated 12 years ago
- LPE exploits for Secret Net and Secret Net Studio☆52Updated 9 years ago
- X41 Smartcard Fuzzer☆120Updated 7 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆57Updated 8 years ago
- A Python library and tools providing easy access to the retdec.com decompilation service through their REST API.☆94Updated 7 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- Firmware analysis gone wild.☆41Updated 11 years ago
- Binary and Directory tree comparison tool using Fuzzy Hashing☆84Updated 11 years ago
- ☆25Updated 10 years ago
- ☆38Updated 10 years ago
- Random number rootkit for the Linux kernel☆28Updated 9 years ago
- It contains hardenedlinux community documentation.☆60Updated 2 years ago
- ☆32Updated last year
- Slides, Papers, Links to CVEs and advisories☆77Updated 8 years ago
- ☆118Updated 5 years ago
- hidusb.sys source code, Windows 10 hidusb.sys fully reversed☆35Updated 8 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53Updated 11 years ago
- ☆59Updated 11 years ago
- lte security☆42Updated 10 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 10 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 11 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆65Updated 10 years ago
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Updated 5 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆34Updated last year
- All related files and slides for past talks☆44Updated last month