luvletter2333 / xz-backdoor-analysisLinks
☆24Updated last year
Alternatives and similar repositories for xz-backdoor-analysis
Users that are interested in xz-backdoor-analysis are comparing it to the libraries listed below
Sorting:
- Minimal setup to trigger the xz backdoor☆28Updated 9 months ago
- XZ backdoor reverse engineering☆98Updated last year
- Documentation about the xz backdoor created by #xz-backdoor-reversing☆61Updated last year
- ☆35Updated last year
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆110Updated 2 years ago
- This repository contains the artifacts for the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".☆70Updated last year
- ☆18Updated last year
- proof-of-concept tty hijacking via TIOCSTI or TIOCLINUX☆36Updated 3 months ago
- ☆112Updated 2 years ago
- yxd - Yuu's heX Dumper☆90Updated last year
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆58Updated last year
- playing with DDR DRAM bus fault injection☆92Updated 9 months ago
- ☆27Updated 2 years ago
- An extensively configurable tool providing a summary of the changes between two files or directories, ignoring all the fluff you don't ca…☆201Updated 2 years ago
- Simple syscall sandboxing for Linux☆137Updated last week
- ☆47Updated last month
- Arbitrary Speculative Code Execution with Return Instructions☆160Updated last year
- A tool to help you understand TPM commands and responses.☆45Updated 8 months ago
- ☆9Updated last year
- ☆46Updated 2 months ago
- a visual toolkit for exploring and editing firmware images, running on web platforms☆114Updated 8 months ago
- ☆12Updated 2 years ago
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- Simple decompiler for Rizin. It's capable of generating readable pseudo code even on handmade assembly.☆60Updated 3 months ago
- Proof-of-concept for the GhostWrite CPU bug.☆115Updated last year
- Security payload for next-Gen firmware architecture☆55Updated 3 months ago
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆160Updated 2 years ago
- decode bits into bytes☆46Updated 5 years ago
- Utility to find hidden Linux kernel modules☆144Updated 2 weeks ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆237Updated last year