eclypsium / BootHoleLinks
BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials
☆68Updated 5 years ago
Alternatives and similar repositories for BootHole
Users that are interested in BootHole are comparing it to the libraries listed below
Sorting:
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆50Updated 7 months ago
- (Linux Kernel) Stack Monitoring Tool☆47Updated 3 years ago
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆65Updated 6 months ago
- ☆32Updated 6 years ago
- Platform Firmware Auditing Tool☆131Updated 7 years ago
- The TpmTool utility is a simple cross-platform tool for accessing TPM2.0 Non-Volatile (NV) Spaces (Index Values) on compliant systems, wi…☆147Updated 4 years ago
- ☆72Updated 7 years ago
- TPM-Fail Attack code & data☆122Updated 2 years ago
- Checks for tpm vulnerabilities☆38Updated 2 years ago
- Linux Kernel Module designed to help analyze volatile memory in the linux kernel☆121Updated 2 months ago
- TPM vulnerability checking tool for CVE-2018-6622. This tool will be published at Black Hat Asia 2019 and Black Hat Europe 2019☆106Updated 3 years ago
- Conferences, tools, papers, etc.☆45Updated last week
- Intel ME Manufacturing Mode Detection Tools☆127Updated 7 years ago
- ☆74Updated 7 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 4 years ago
- A repository of my presentations☆168Updated 2 years ago
- ☆29Updated 6 years ago
- IPMI stuff from DARPA work☆74Updated 2 years ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆241Updated last year
- Live SSH/SSL/TLS decryption - extraction of secret keys from live process memory☆110Updated 10 years ago
- Rootkit Detector for UNIX☆61Updated 2 years ago
- Disabling kernel lockdown on Ubuntu without physical access☆81Updated 2 years ago
- ☆33Updated 8 years ago
- Exercises for (legacy) Computer Security course in the University of Oulu☆47Updated 2 years ago
- A framework to track the evolution of Operating Systems over time☆63Updated 2 years ago
- Conference Presentations☆45Updated 5 years ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- Fork of aeskeyfind that knows more formats of AES key schedule☆67Updated 8 years ago
- Bash script to test executable properties like (PIE, RELRO, PaX, Canaries, ASLR). (Version derivated from the original one trapkit.de/too…☆24Updated 12 years ago
- My Packet Captures, Quagga Tutorial, and Cisco Reversing.☆28Updated 7 years ago