immune-gmbh / tpm-vuln-checkerLinks
Checks for tpm vulnerabilities
☆37Updated 2 years ago
Alternatives and similar repositories for tpm-vuln-checker
Users that are interested in tpm-vuln-checker are comparing it to the libraries listed below
Sorting:
- PoC code and tools for Black Hat USA 2024☆21Updated last year
- BINARLY Research Tools and PoCs☆36Updated 10 months ago
- Userland exec PoC to be used as attack vector technique☆85Updated 6 months ago
- One Bootloader to Load Them All - Research materials, Code , Etc.☆52Updated 2 years ago
- Finds imports that could be exploited, still requires manual analysis.☆27Updated 2 years ago
- ☆11Updated 3 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- Service Locator Protocol Research Tool☆9Updated 2 years ago
- Golang Shlyuz Implant Implementation☆13Updated 2 months ago
- Linux rootkit for educational purposes☆33Updated last year
- yet another hidden LKM hunter☆24Updated last year
- WallEscape vulnerability in util-linux☆51Updated last year
- details about DIAL protocol vulnerabilities☆28Updated last year
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆13Updated 7 months ago
- Shared library implementations that transform the containing process into a shell when loaded (useful for privilege escalation, argument …☆27Updated last year
- ☆26Updated last year
- rpv-web is a browser based frontend for the rpv library☆26Updated 2 months ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆36Updated 7 months ago
- DEbian Cve REproducer Tool☆25Updated last week
- Detect and remove the presence of canary tokens☆22Updated last year
- Signing-key abuse and update exploitation framework☆130Updated 2 months ago
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- Elasticsearch Stack Overflow Vulnerability☆18Updated last year
- A MBR Fuzzer☆29Updated last year
- ☆39Updated 2 years ago
- ☆25Updated last year
- ☆12Updated 3 years ago
- Fuzz Network Traffic☆18Updated 7 months ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆63Updated last year