legbacore / t2e_integrity_checkLinks
Integrity checking script for Apple Thunderbolt to Ethernet adapters, to check for attacks similar to Thunderstrike 2
☆26Updated 10 years ago
Alternatives and similar repositories for t2e_integrity_check
Users that are interested in t2e_integrity_check are comparing it to the libraries listed below
Sorting:
- Firmware analysis gone wild.☆41Updated 11 years ago
- an open source toolkit for PCI bus exploration☆72Updated 9 years ago
- A TE executable format loader for IDA☆28Updated 10 years ago
- A small utility to read and write to Macs physical memory using default AppleHWAccess.kext.☆25Updated 10 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Updated 8 years ago
- lte security☆42Updated 10 years ago
- XNU Rootkit Framework☆126Updated 10 years ago
- ☆25Updated 10 years ago
- Very simple runtime hooking library for OS X.☆15Updated 10 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆49Updated 9 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆38Updated 7 years ago
- OS X rootkit loader version #2☆12Updated 10 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 11 years ago
- ☆22Updated 10 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆66Updated 10 years ago
- A library for efficient interception of established TCP connections☆20Updated 10 years ago
- Volatility plugin to extract FileVault 2 VMK's☆51Updated 4 years ago
- XED based Disassembly Engine☆20Updated 7 years ago
- OS X rootkit loader version #1☆18Updated 10 years ago
- An OSX exploitation helper library.☆35Updated 10 years ago
- A kernel extension to mitigate Gatekeeper bypasses☆49Updated 10 years ago
- Debugger for HTC phones bootloader (HBOOT).☆20Updated 12 years ago
- Visualize an ELF's execution☆11Updated 10 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- Abstract Binary Format Manipulation - ELF, PE and Mach-O format☆119Updated 10 years ago
- LPE exploits for Secret Net and Secret Net Studio☆51Updated 9 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Updated 2 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆43Updated 11 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆48Updated 9 years ago