daveti / usbfilterLinks
A USB layer firewall for the Linux kernel
☆35Updated 7 years ago
Alternatives and similar repositories for usbfilter
Users that are interested in usbfilter are comparing it to the libraries listed below
Sorting:
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆57Updated 7 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53Updated 11 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 8 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 8 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- ☆24Updated 9 years ago
- ☆138Updated 7 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- An EFI image parser and dissector☆51Updated 12 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- Firmware analysis gone wild.☆42Updated 10 years ago
- Tools for reverse engineering the Utimaco Firmware☆44Updated 8 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 10 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- Slides, Papers, Links to CVEs and advisories☆78Updated 7 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Updated 10 years ago
- Ambush Host Intrusion Prevention System☆65Updated 11 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55Updated 9 years ago
- Memory forensics of virtualization environments☆46Updated 10 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆56Updated 7 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- ☆56Updated this week
- lte security☆41Updated 9 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 9 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 9 years ago
- Public resources NB shares☆18Updated 9 years ago
- Scripts created by MRG Effitas☆42Updated 8 years ago
- Verification Validation and Visualization of Security Policy Abstractions☆44Updated last year