Checks for tpm vulnerabilities
☆38Mar 16, 2023Updated 3 years ago
Alternatives and similar repositories for tpm-vuln-checker
Users that are interested in tpm-vuln-checker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2017-5721 Proof-of-Concept☆17Oct 23, 2017Updated 8 years ago
- A repository with UEFI research stuff☆16Jun 23, 2023Updated 2 years ago
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w…☆10Jul 25, 2023Updated 2 years ago
- lojax_uefi_rootkit_checker☆19Nov 18, 2018Updated 7 years ago
- A USB armory based USB sandbox☆22Jun 14, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Binarly Vulnerability Research Advisories☆184Mar 25, 2026Updated last month
- PoC for Acronis Arbitrary File Read - CVE-2022-45451☆18Dec 20, 2022Updated 3 years ago
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆241May 2, 2025Updated last year
- ☆97Jun 18, 2024Updated last year
- Memory protection and randomization tests (not limited to PaX enabled kernels)☆12Mar 5, 2024Updated 2 years ago
- Framework for building transparent memory encryption and authentication solutions☆27Jun 19, 2018Updated 7 years ago
- Quick network scanner library. https://crates.io/crates/qscan☆93Dec 26, 2022Updated 3 years ago
- Parsec Go client☆13Oct 25, 2022Updated 3 years ago
- PoC code and tools for Black Hat USA 2024☆24Aug 1, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A small and portable Windows C library for sandbox detection☆36Oct 2, 2023Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 3 years ago
- ☆16Oct 18, 2024Updated last year
- List of custom Nuclei templates☆16Nov 4, 2023Updated 2 years ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆243Mar 12, 2024Updated 2 years ago
- The source code produces TWO different AMIBIOS 1B module utilities, ami_1b_splitter and ami_1b_combiner. The utilities produced by the so…☆36Jul 13, 2017Updated 8 years ago
- A Patchless AMSI Bypass Technique using VEH²☆32Jun 22, 2025Updated 10 months ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆52Sep 20, 2017Updated 8 years ago
- Converged Security Suite for Intel & AMD platform security features☆72Apr 30, 2026Updated last week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Jan 31, 2019Updated 7 years ago
- JavaAgent内存马实现、检测、修复demo