eclypsium / BootHole
BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials
☆65Updated 4 years ago
Alternatives and similar repositories for BootHole
Users that are interested in BootHole are comparing it to the libraries listed below
Sorting:
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 3 years ago
- ☆32Updated 5 years ago
- Summary of the patch status for Meltdown / Spectre☆348Updated 7 years ago
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆62Updated 3 weeks ago
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆48Updated last month
- ☆20Updated 3 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- grepcidr can be used to filter a list of IP addresses against one or more Classless Inter-Domain Routing (CIDR) specifications, or arbitr…☆27Updated last year
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- retrace is a versatile security vulnerability / bug discovery tool through monitoring and modifying the behavior of compiled binaries on …☆61Updated 3 years ago
- Platform Firmware Auditing Tool☆131Updated 6 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Updated 8 years ago
- Conferences, tools, papers, etc.☆43Updated last week
- MSR Project Freta☆77Updated 9 months ago
- Forensic Analysis Tool for Btrfs File System.☆21Updated 6 years ago
- A tool for parsing common ACPI tables☆14Updated 4 years ago
- IPMI stuff from DARPA work☆74Updated 2 years ago
- (Linux Kernel) Stack Monitoring Tool☆45Updated 3 years ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆25Updated last year
- A tiny tool for embedding CoSWID tags in EFI binaries☆22Updated last month
- LKRG bypass methods☆72Updated 5 years ago
- ☆24Updated 9 years ago
- ☆48Updated 3 months ago
- Intel Management Engine firmware loader plugin for IDA☆91Updated 7 years ago
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆54Updated 2 weeks ago
- Example program using eBPF to log data being based in using shell pipes☆41Updated 4 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- Linux Security Hardening for Confidential Compute☆66Updated 7 months ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆43Updated last year