eclypsium / BootHole
BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials
☆64Updated 4 years ago
Alternatives and similar repositories for BootHole:
Users that are interested in BootHole are comparing it to the libraries listed below
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆61Updated 3 years ago
- ☆32Updated 5 years ago
- Linux Kernel Module designed to help analyze volatile memory in the linux kernel☆115Updated 11 months ago
- ☆19Updated 3 years ago
- (Linux Kernel) Stack Monitoring Tool☆42Updated 3 years ago
- Platform Firmware Auditing Tool☆130Updated 6 years ago
- F-Secure Armory Drive - USB encrypted drive with mobile unlock over BLE☆53Updated 2 weeks ago
- Conferences, tools, papers, etc.☆43Updated 4 months ago
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆60Updated this week
- A USB armory based USB sandbox☆20Updated 7 years ago
- Tool for UEFI Secure Boot DBX updates☆27Updated 2 years ago
- Tools to generate a Debian Linux distribution with chipsec to test hardware requirements☆47Updated 2 months ago
- Checks for tpm vulnerabilities☆36Updated last year
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆56Updated 5 years ago
- MSR Project Freta☆76Updated 6 months ago
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆30Updated 2 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Updated 4 years ago
- Collection of Scripts to Automatically Unlock LUKS Devices on kexec Reboot☆57Updated 6 years ago
- Rootkit Detector for UNIX☆62Updated last year
- LKRG bypass methods☆71Updated 5 years ago
- grepcidr can be used to filter a list of IP addresses against one or more Classless Inter-Domain Routing (CIDR) specifications, or arbitr…☆26Updated last year
- A Tamarin model and analysis of EMV☆29Updated 3 years ago
- ☆29Updated 5 years ago
- [CVE-2019-14615] iGPU Leak: An Information Leakage Vulnerability on Intel Integrated GPU☆54Updated 4 years ago
- Converged Security Suite for Intel & AMD platform security features☆60Updated this week
- Linux TPM Trusted Boot binary_bios_measurements file parser/reconstructor☆21Updated 4 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆43Updated last year
- Red Canary's eBPF Sensor☆101Updated 6 months ago
- Disabling kernel lockdown on Ubuntu without physical access☆78Updated 2 years ago
- Example program using eBPF to log data being based in using shell pipes☆41Updated 3 years ago