eclypsium / BootHoleLinks
BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials
☆68Updated 5 years ago
Alternatives and similar repositories for BootHole
Users that are interested in BootHole are comparing it to the libraries listed below
Sorting:
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆66Updated last week
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆50Updated 7 months ago
- TPM-Fail Attack code & data☆122Updated 2 years ago
- (Linux Kernel) Stack Monitoring Tool☆48Updated 3 years ago
- The TpmTool utility is a simple cross-platform tool for accessing TPM2.0 Non-Volatile (NV) Spaces (Index Values) on compliant systems, wi…☆147Updated 4 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 4 years ago
- Linux Kernel Module designed to help analyze volatile memory in the linux kernel☆123Updated 3 months ago
- Checks for tpm vulnerabilities☆38Updated 2 years ago
- A repository of my presentations☆168Updated 2 years ago
- ☆33Updated 6 years ago
- Intel ME Manufacturing Mode Detection Tools☆127Updated 7 years ago
- ☆29Updated 6 years ago
- Conferences, tools, papers, etc.☆45Updated last month
- ☆33Updated 8 years ago
- Summary of the patch status for Meltdown / Spectre☆350Updated 7 years ago
- Platform Firmware Auditing Tool☆131Updated 7 years ago
- Rootkit Detector for UNIX☆61Updated 2 years ago
- ☆72Updated 7 years ago
- ☆74Updated 7 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆59Updated 7 years ago
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w…☆10Updated 2 years ago
- Live SSH/SSL/TLS decryption - extraction of secret keys from live process memory☆110Updated 10 years ago
- My Packet Captures, Quagga Tutorial, and Cisco Reversing.☆28Updated 7 years ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- ☆56Updated 11 months ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆242Updated last year
- Conference Presentations☆45Updated 5 years ago
- 0-ring rootkit revealer for Linux☆29Updated 6 years ago
- ☆246Updated 4 years ago
- Toolkit for Filesystem based Data Hiding Techniques.☆39Updated 6 years ago