daveti / usbfilterLinks
A USB layer firewall for the Linux kernel
☆35Updated 7 years ago
Alternatives and similar repositories for usbfilter
Users that are interested in usbfilter are comparing it to the libraries listed below
Sorting:
- lte security☆41Updated 9 years ago
- Tools for viewing and extracting HDD firmware files☆74Updated 10 years ago
- Tools for reverse engineering the Utimaco Firmware☆44Updated 8 years ago
- Firmware analysis gone wild.☆42Updated 10 years ago
- ☆24Updated 10 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆57Updated 7 years ago
- LPE exploits for Secret Net and Secret Net Studio☆51Updated 9 years ago
- X41 Smartcard Fuzzer☆119Updated 6 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 9 years ago
- Public resources NB shares☆18Updated 9 years ago
- SIGSTOPing ELF binaries since 0x7E1☆54Updated 11 months ago
- ☆83Updated 7 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆56Updated 8 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆44Updated 8 years ago
- An EFI image parser and dissector☆52Updated 12 years ago
- A Python library and tools providing easy access to the retdec.com decompilation service through their REST API.☆94Updated 6 years ago
- ☆32Updated last year
- Intel Management Engine firmware loader plugin for IDA☆93Updated 8 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆66Updated 9 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 9 years ago
- ☆118Updated 4 years ago
- Implementation of the SMM rootkit "The Watcher"☆128Updated 3 years ago
- Platform Firmware Auditing Tool☆131Updated 6 years ago
- Memory forensics of virtualization environments☆47Updated 10 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53Updated 11 years ago
- Stealth's 64bit injectso port☆74Updated 15 years ago
- CSAW CTF 2015 Linux kernel exploitation challenge☆36Updated 9 years ago
- ☆38Updated 9 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago