immune-gmbh / tpm-vuln-checkerView external linksLinks
Checks for tpm vulnerabilities
☆38Mar 16, 2023Updated 2 years ago
Alternatives and similar repositories for tpm-vuln-checker
Users that are interested in tpm-vuln-checker are comparing it to the libraries listed below
Sorting:
- ☆24Aug 27, 2021Updated 4 years ago
- Check if the trust of a ROM image may be affected by the recent Intel Alder Lake leak☆18May 10, 2023Updated 2 years ago
- Memory protection and randomization tests (not limited to PaX enabled kernels)☆12Mar 5, 2024Updated last year
- AEAD encryption using Trusted Platform Module (TPM)☆12Jan 5, 2026Updated last month
- Repository of vulnerabilities disclosed by ESET☆29Jul 13, 2022Updated 3 years ago
- PoC for Acronis Arbitrary File Read - CVE-2022-45451☆18Dec 20, 2022Updated 3 years ago
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w…☆10Jul 25, 2023Updated 2 years ago
- Quick network scanner library. https://crates.io/crates/qscan☆91Dec 26, 2022Updated 3 years ago
- A repository with UEFI research stuff☆16Jun 23, 2023Updated 2 years ago
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆242May 2, 2025Updated 9 months ago
- Binarly Vulnerability Research Advisories☆185Jan 26, 2026Updated 3 weeks ago
- A Patchless AMSI Bypass Technique using VEH²☆30Jun 22, 2025Updated 7 months ago
- A small and portable Windows C library for sandbox detection☆35Oct 2, 2023Updated 2 years ago
- VM Escape for Parallels Desktop <18.1.1☆37May 7, 2023Updated 2 years ago
- ☆19Mar 4, 2023Updated 2 years ago
- List of custom Nuclei templates☆16Nov 4, 2023Updated 2 years ago
- Easy offline mail with mbsync, notmuch, goimapnotifier☆17Feb 8, 2020Updated 6 years ago
- lojax_uefi_rootkit_checker☆19Nov 18, 2018Updated 7 years ago
- Implementation of rfc7664 dragonfly key exchange using ECC☆20Oct 12, 2018Updated 7 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 2 years ago
- Open KLara Project☆34Updated this week
- ☆17Jul 20, 2018Updated 7 years ago
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆21Jul 4, 2024Updated last year
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Jan 31, 2019Updated 7 years ago
- ☆22Aug 15, 2016Updated 9 years ago
- ☆17Jun 14, 2023Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆21Feb 12, 2023Updated 3 years ago
- Collection of my Security Blueprints & Guides☆52Oct 2, 2025Updated 4 months ago
- U3 armory - exploiting the AutoRunz☆22Feb 7, 2017Updated 9 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Mar 1, 2023Updated 2 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Dec 12, 2022Updated 3 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Jan 20, 2023Updated 3 years ago
- A Ruby micro-framework for writing and running exploit payloads☆23Jan 16, 2026Updated last month
- ☆96Jun 18, 2024Updated last year
- This is an instruction to run your own SMM code.☆109Mar 8, 2021Updated 4 years ago
- A simple command line tool which quickly audits the Disallow entries of a site's robots.txt.☆23Apr 5, 2023Updated 2 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- RegStrike is a .reg payload generator☆58Sep 19, 2023Updated 2 years ago
- List of fresh and validated DNS resolvers updated every 12h.☆24Feb 11, 2026Updated last week