immune-gmbh / tpm-vuln-checker
Checks for tpm vulnerabilities
☆37Updated 2 years ago
Alternatives and similar repositories for tpm-vuln-checker:
Users that are interested in tpm-vuln-checker are comparing it to the libraries listed below
- PoC code and tools for Black Hat USA 2024☆20Updated 7 months ago
- Userland exec PoC to be used as attack vector technique☆81Updated last month
- ugly code to check linux kernel memory and dump some internal structures☆46Updated 4 months ago
- One Bootloader to Load Them All - Research materials, Code , Etc.☆51Updated 2 years ago
- LKRG bypass methods☆71Updated 5 years ago
- BINARLY Research Tools and PoCs☆35Updated 5 months ago
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆53Updated last month
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆31Updated 3 months ago
- A framework for parsing binary data.☆16Updated 2 years ago
- ☆25Updated last year
- Research tools developed for Intel Wi-Fi chips☆52Updated last year
- A repository with UEFI research stuff☆13Updated last year
- iTLB multihit PoC☆40Updated last year
- ☆15Updated 6 months ago
- Linux rootkit for educational purposes☆30Updated 11 months ago
- Fuzz Network Traffic☆18Updated 2 months ago
- Converged Security Suite for Intel & AMD platform security features☆60Updated last month
- ☆32Updated 4 years ago
- A tool to perform so called BGE attack☆24Updated 11 months ago
- Check if the trust of a ROM image may be affected by the recent Intel Alder Lake leak☆17Updated last year
- ☆19Updated 3 years ago
- A MBR Fuzzer☆29Updated 11 months ago
- rpv-web is a browser based frontend for the rpv library☆24Updated 7 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated 2 weeks ago
- A U-Boot hacking toolkit for security researchers and tinkerers☆20Updated 2 months ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆58Updated 4 months ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆13Updated 3 months ago
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆30Updated 2 years ago
- ☆32Updated 7 years ago