immune-gmbh / tpm-vuln-checkerLinks
Checks for tpm vulnerabilities
☆38Updated 2 years ago
Alternatives and similar repositories for tpm-vuln-checker
Users that are interested in tpm-vuln-checker are comparing it to the libraries listed below
Sorting:
- BINARLY Research Tools and PoCs☆39Updated last year
- Userland exec PoC to be used as attack vector technique☆93Updated 2 months ago
- PoC code and tools for Black Hat USA 2024☆24Updated last year
- yet another hidden LKM hunter☆29Updated 3 months ago
- Memory protection and randomization tests (not limited to PaX enabled kernels)☆12Updated last year
- WallEscape vulnerability in util-linux☆51Updated last year
- Kiddy - (linux) kernel identity spoofer☆15Updated last year
- DEbian Cve REproducer Tool☆27Updated last month
- One Bootloader to Load Them All - Research materials, Code , Etc.☆62Updated 3 years ago
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆65Updated last year
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆68Updated 2 years ago
- Linux rootkit for educational purposes☆34Updated last year
- Finds imports that could be exploited, still requires manual analysis.☆29Updated 3 years ago
- An injector that use PT_LOAD technique☆12Updated 3 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 5 months ago
- rpv-web is a browser based frontend for the rpv library☆25Updated last month
- Linpmem is a linux memory acquisition tool☆95Updated 6 months ago
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆59Updated last year
- Decrypt encrypted SonicOSX firmware images☆20Updated 10 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆136Updated 7 months ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆16Updated last year
- ☆11Updated last year
- Golang Shlyuz Implant Implementation☆13Updated 7 months ago
- Ghidra scripts for recovering string definitions in Go binaries☆125Updated last month
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 4 years ago
- iTLB multihit PoC☆42Updated 2 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated last year
- Detect and remove the presence of canary tokens☆24Updated 2 years ago
- ☆11Updated 3 years ago
- Scapy hands-on☆35Updated 2 years ago