eclypsium / BootHole
BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials
☆65Updated 4 years ago
Alternatives and similar repositories for BootHole:
Users that are interested in BootHole are comparing it to the libraries listed below
- ☆32Updated 5 years ago
- Tools to generate a Debian Linux distribution with chipsec to test hardware requirements☆48Updated last month
- (Linux Kernel) Stack Monitoring Tool☆44Updated 3 years ago
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆60Updated 2 months ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆62Updated 3 years ago
- Platform Firmware Auditing Tool☆131Updated 6 years ago
- IPMI stuff from DARPA work☆74Updated 2 years ago
- Conference Presentations☆42Updated 5 years ago
- ☆29Updated 6 years ago
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆30Updated 2 years ago
- Summary of the patch status for Meltdown / Spectre☆348Updated 7 years ago
- A framework for parsing binary data.☆16Updated 2 years ago
- ☆73Updated 7 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- ☆19Updated 3 years ago
- Tool for UEFI Secure Boot DBX updates☆27Updated 2 years ago
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆53Updated last month
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆184Updated this week
- A tool for parsing common ACPI tables☆14Updated 4 years ago
- LKRG bypass methods☆71Updated 5 years ago
- Static code analysis of refpolicy style SELinux policy☆42Updated last week
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- CITL's static analysis engine for native code artifacts☆20Updated 3 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- Converged Security Suite for Intel & AMD platform security features☆60Updated last month
- CVE-2017-5721 Proof-of-Concept☆17Updated 7 years ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆231Updated last year
- grepcidr can be used to filter a list of IP addresses against one or more Classless Inter-Domain Routing (CIDR) specifications, or arbitr…☆26Updated last year
- MSR Project Freta☆76Updated 8 months ago