eclypsium / BootHoleLinks
BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials
☆66Updated 5 years ago
Alternatives and similar repositories for BootHole
Users that are interested in BootHole are comparing it to the libraries listed below
Sorting:
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆65Updated 4 months ago
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆48Updated 5 months ago
- (Linux Kernel) Stack Monitoring Tool☆47Updated 3 years ago
- ☆54Updated 8 months ago
- Conferences, tools, papers, etc.☆43Updated this week
- ☆32Updated 6 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 3 years ago
- Platform Firmware Auditing Tool☆131Updated 7 years ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- A repository of my presentations☆168Updated last year
- This repository contains additional files mentioned in the blog post☆22Updated 6 years ago
- Linux Kernel Module designed to help analyze volatile memory in the linux kernel☆120Updated 2 weeks ago
- ☆29Updated 6 years ago
- Qubes containerization on Windows☆130Updated 4 years ago
- TPM-Fail Attack code & data☆122Updated 2 years ago
- A tool for parsing common ACPI tables☆14Updated 5 years ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆25Updated last year
- TPM vulnerability checking tool for CVE-2018-6622. This tool will be published at Black Hat Asia 2019 and Black Hat Europe 2019☆105Updated 3 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆59Updated 7 years ago
- Pattern recognition for hosts, services, and content☆13Updated 3 years ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆163Updated last year
- Conference Presentations☆45Updated 5 years ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆241Updated last year
- Intel ME Manufacturing Mode Detection Tools☆126Updated 6 years ago
- Public Issue tracker to gather feedback for and allow discussions around Malpedia☆35Updated 3 years ago
- ☆72Updated 6 years ago
- A framework to track the evolution of Operating Systems over time☆61Updated last year
- The Alternative Fileless File System☆57Updated 6 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Checks for tpm vulnerabilities☆37Updated 2 years ago