eclypsium / BootHole
BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials
☆65Updated 4 years ago
Alternatives and similar repositories for BootHole:
Users that are interested in BootHole are comparing it to the libraries listed below
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆61Updated 2 months ago
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆48Updated last week
- ☆32Updated 5 years ago
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆188Updated last week
- IPMI stuff from DARPA work☆74Updated 2 years ago
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- Summary of the patch status for Meltdown / Spectre☆348Updated 7 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆62Updated 3 years ago
- Platform Firmware Auditing Tool☆131Updated 6 years ago
- MSR Project Freta☆77Updated 9 months ago
- Conferences, tools, papers, etc.☆43Updated 2 months ago
- The Platform Attribute Certificate Creator can gather component details, create, sign, and validate the TCG-defined Platform Credential. …☆62Updated last week
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆93Updated 7 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- Linux Security Hardening for Confidential Compute☆66Updated 7 months ago
- ☆31Updated 4 years ago
- Disabling kernel lockdown on Ubuntu without physical access☆79Updated 2 years ago
- ☆19Updated 3 years ago
- Exercises for (legacy) Computer Security course in the University of Oulu☆45Updated last year
- tcpslice concatenates multiple pcap files together, or extracts time slices from one or more pcap files.☆73Updated last week
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- ☆34Updated 2 years ago
- Intel Management Engine firmware loader plugin for IDA☆90Updated 7 years ago
- Tool for UEFI Secure Boot DBX updates☆27Updated 2 years ago
- Linux Kernel Module designed to help analyze volatile memory in the linux kernel☆116Updated last year
- grepcidr can be used to filter a list of IP addresses against one or more Classless Inter-Domain Routing (CIDR) specifications, or arbitr…☆27Updated last year
- Conference Presentations☆42Updated 5 years ago
- (Linux Kernel) Stack Monitoring Tool☆44Updated 3 years ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆64Updated 3 weeks ago
- Artifacts for the USENIX publication.☆58Updated 5 years ago