eclypsium / BootHole
BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials
☆63Updated 4 years ago
Related projects: ⓘ
- Tools to generate a Debian Linux distribution with chipsec to test hardware requirements☆45Updated 3 years ago
- Conferences, tools, papers, etc.☆43Updated last week
- ☆32Updated 5 years ago
- (Linux Kernel) Stack Monitoring Tool☆41Updated 2 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆60Updated 2 years ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆25Updated 10 months ago
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆54Updated last month
- TLS CBC Padding Oracle Checker☆51Updated 2 years ago
- MSR Project Freta☆76Updated last month
- ☆14Updated 2 weeks ago
- Checks for tpm vulnerabilities☆35Updated last year
- F-Secure Armory Drive - USB encrypted drive with mobile unlock over BLE☆54Updated 11 months ago
- Platform Firmware Auditing Tool☆129Updated 6 years ago
- ☆18Updated 3 years ago
- Command line utility for parsing certificates☆59Updated 3 years ago
- Disabling kernel lockdown on Ubuntu without physical access☆77Updated last year
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆26Updated last year
- ☆47Updated 9 months ago
- Public Issue tracker to gather feedback for and allow discussions around Malpedia☆31Updated 2 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆56Updated 4 years ago
- Created by Jeffrey Martin via the GitHub Connector☆26Updated 6 months ago
- asadbg is a framework of tools to aid in automating live debugging of Cisco ASA devices☆74Updated 2 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆49Updated 2 years ago
- Project containing several tools/ scripts to recover the OpenSSH session keys used to encrypt/ decrypt SSH traffic.☆77Updated 3 months ago
- Example program using eBPF to log data being based in using shell pipes☆40Updated 3 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Updated 7 years ago
- A Spicy protocol analyzer for WireGuard☆27Updated 4 years ago
- A multi-purpose, modular medium-interaction honeypot based on Twisted.☆19Updated 3 years ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆53Updated 2 weeks ago
- LKRG bypass methods☆69Updated 4 years ago