immune-gmbh / tpm-vuln-checkerLinks
Checks for tpm vulnerabilities
☆37Updated 2 years ago
Alternatives and similar repositories for tpm-vuln-checker
Users that are interested in tpm-vuln-checker are comparing it to the libraries listed below
Sorting:
- One Bootloader to Load Them All - Research materials, Code , Etc.☆52Updated 2 years ago
- PoC code and tools for Black Hat USA 2024☆21Updated 10 months ago
- Userland exec PoC to be used as attack vector technique☆85Updated 4 months ago
- BINARLY Research Tools and PoCs☆36Updated 8 months ago
- iTLB multihit PoC☆41Updated last year
- PoC for PixieFail vulnerabilities☆23Updated last year
- A framework for parsing binary data.☆17Updated 2 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- Linux rootkit for educational purposes☆31Updated last year
- A repository with UEFI research stuff☆15Updated last year
- Research tools developed for Intel Wi-Fi chips☆54Updated last week
- DEbian Cve REproducer Tool☆25Updated last year
- Kiddy - (linux) kernel identity spoofer☆13Updated last year
- ☆130Updated last month
- An eBPF detection program for CVE-2022-0847☆28Updated 2 years ago
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆54Updated last month
- ☆26Updated 2 years ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆61Updated last year
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆33Updated 6 months ago
- ☆10Updated 8 years ago
- ☆26Updated last year
- Open Source eBPF Malware Analysis Framework☆48Updated 8 months ago
- TrustZone Trusted Application 0-Days by Design☆20Updated last month
- yet another hidden LKM hunter☆23Updated last year
- rpv-web is a browser based frontend for the rpv library☆25Updated last month
- ☆26Updated 4 months ago
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆32Updated 2 years ago
- ☆31Updated 4 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- ☆16Updated 9 months ago