eclypsium / BootHoleLinks
BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials
☆67Updated 5 years ago
Alternatives and similar repositories for BootHole
Users that are interested in BootHole are comparing it to the libraries listed below
Sorting:
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆48Updated 4 months ago
- ☆32Updated 5 years ago
- Conferences, tools, papers, etc.☆43Updated 2 months ago
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆65Updated 4 months ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 3 years ago
- ☆29Updated 6 years ago
- (Linux Kernel) Stack Monitoring Tool☆46Updated 3 years ago
- TPM-Fail Attack code & data☆122Updated 2 years ago
- Platform Firmware Auditing Tool☆131Updated 6 years ago
- ☆53Updated 8 months ago
- Intel ME Manufacturing Mode Detection Tools☆126Updated 6 years ago
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- A tool for parsing common ACPI tables☆14Updated 5 years ago
- Qubes containerization on Windows☆130Updated 4 years ago
- [CVE-2019-14615] iGPU Leak: An Information Leakage Vulnerability on Intel Integrated GPU☆55Updated 5 years ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- Created by Jeffrey Martin via the GitHub Connector☆26Updated 6 months ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆59Updated 6 years ago
- IPMI stuff from DARPA work☆74Updated 2 years ago
- This repository contains additional files mentioned in the blog post☆22Updated 6 years ago
- CVE-2017-5721 Proof-of-Concept☆17Updated 7 years ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆25Updated last year
- Summary of the patch status for Meltdown / Spectre☆350Updated 7 years ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆239Updated last year
- dcfldd - enhanced version of dd for forensics and security☆70Updated 7 years ago
- Offline Active Directory Domain Services (AD DS) Join☆11Updated 8 years ago
- The TpmTool utility is a simple cross-platform tool for accessing TPM2.0 Non-Volatile (NV) Spaces (Index Values) on compliant systems, wi…☆147Updated 4 years ago
- Intel Management Engine firmware loader plugin for IDA☆93Updated 8 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆152Updated 5 years ago