quarkslab / tpmeeLinks
☆11Updated 3 years ago
Alternatives and similar repositories for tpmee
Users that are interested in tpmee are comparing it to the libraries listed below
Sorting:
- Scripts from Ghidra Golf competitions☆34Updated 2 years ago
- SPI flash read MitM attack PoC☆38Updated 3 years ago
- Breaking Secure Boot with SMM☆41Updated 3 years ago
- Extract data of TTD trace file to a minidump☆30Updated 2 years ago
- ☆14Updated 3 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- ☆28Updated 5 years ago
- Python interface for Binexport, the Bindiff export format☆17Updated this week
- A modular Karton Framework service that unpacks common packers like UPX and others using the Qiling Framework.☆57Updated 4 years ago
- One Bootloader to Load Them All - Research materials, Code , Etc.☆52Updated 2 years ago
- An IDA plugin to deal with Event Tracing for Windows (ETW)☆55Updated 3 years ago
- Wrapper around Ghidra's analyzeHeadless script☆13Updated 3 years ago
- Repository of vulnerabilities disclosed by ESET☆28Updated 3 years ago
- Slides about HyperDbg☆40Updated 3 weeks ago
- ☆36Updated 4 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆55Updated 3 years ago
- Ghidra analyzer for UEFI firmware.☆18Updated 2 years ago
- ☆13Updated 2 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- RenameLocalVars is an IDA plugin that renames local variables to something easier to read.☆15Updated 2 years ago
- Slides from various conference talks☆37Updated 2 years ago
- Utilities for working with vivisect☆25Updated 5 months ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆38Updated 3 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- PoC code and tools for Black Hat USA 2024☆21Updated last year
- ☆28Updated 9 months ago
- Export disassemblies into Protocol Buffers☆21Updated 3 weeks ago
- ☆28Updated 6 months ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 2 years ago
- ☆48Updated 5 years ago