immune-gmbh / tpm-vuln-checker
Checks for tpm vulnerabilities
☆36Updated last year
Alternatives and similar repositories for tpm-vuln-checker:
Users that are interested in tpm-vuln-checker are comparing it to the libraries listed below
- Userland exec PoC to be used as attack vector technique☆62Updated 2 weeks ago
- One Bootloader to Load Them All - Research materials, Code , Etc.☆51Updated 2 years ago
- Research tools developed for Intel Wi-Fi chips☆50Updated last year
- BINARLY Research Tools and PoCs☆35Updated 4 months ago
- PoC code and tools for Black Hat USA 2024☆16Updated 6 months ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- LKRG bypass methods☆70Updated 5 years ago
- Fuzz Network Traffic☆18Updated last month
- A repository with UEFI research stuff☆13Updated last year
- Finds imports that could be exploited, still requires manual analysis.☆27Updated 2 years ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆14Updated 2 months ago
- ugly code to check linux kernel memory and dump some internal structures☆46Updated 2 months ago
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆30Updated 2 months ago
- ☆25Updated last year
- iTLB multihit PoC☆40Updated last year
- Linux rootkit for educational purposes☆31Updated 10 months ago
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆30Updated 2 years ago
- ☆18Updated last year
- WallEscape vulnerability in util-linux☆50Updated 10 months ago
- Parser for Windows PowerShell script block logs☆13Updated last month
- An eBPF detection program for CVE-2022-0847☆28Updated 2 years ago
- ☆24Updated 9 months ago
- ☆101Updated 4 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- HN Security's advisories.☆21Updated 3 months ago
- A MBR Fuzzer☆28Updated 10 months ago
- DEbian Cve REproducer Tool☆22Updated last year
- rpv-web is a browser based frontend for the rpv library☆24Updated 6 months ago
- Detect and remove the presence of canary tokens☆19Updated last year
- An authorized remote user with access or knowledge of the standard encryption key can gain access and decrypt the FortiOS backup files an…☆14Updated last year