☆11Apr 7, 2022Updated 3 years ago
Alternatives and similar repositories for tpmee
Users that are interested in tpmee are comparing it to the libraries listed below
Sorting:
- Vulnerabilities advisories and PoC☆18Nov 21, 2025Updated 3 months ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- A Dissect module implementing a parser for Microsofts Extensible Storage Engine Database (ESEDB), used for example in Active Directory, E…☆24Nov 20, 2025Updated 3 months ago
- Based off of [tarekwiz / League-Unpacker]☆23Aug 26, 2023Updated 2 years ago
- Outil de sécurité des architectures kubernetes avancées☆76Nov 27, 2025Updated 3 months ago
- BOF (Boiboite Opener Framework) is a testing framework for industrial protocols implementations and devices.☆52Feb 14, 2025Updated last year
- Vigrid is a Cyber Range redesign of the GNS3 tool able to virtualize almost any physical device on many CPU. It is also able to virtualiz…☆23Feb 20, 2026Updated last week
- ☆25Sep 30, 2022Updated 3 years ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆115Apr 14, 2023Updated 2 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Dec 4, 2024Updated last year
- Decode machine code into VEX IR and translate into LLVM IR☆28Jun 1, 2019Updated 6 years ago
- Rapports techniques de VIGINUM☆36Sep 15, 2025Updated 5 months ago
- Find IP address and Geolocation of target whatsapp user☆11Nov 23, 2023Updated 2 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆33Apr 6, 2022Updated 3 years ago
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆83Feb 21, 2024Updated 2 years ago
- CTF writeups☆36Dec 26, 2025Updated 2 months ago
- ☆37Jun 1, 2022Updated 3 years ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated 3 weeks ago
- Offline amnesic live Linux distribution☆14Mar 8, 2025Updated 11 months ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Collection of slides☆33Aug 20, 2025Updated 6 months ago
- Application Verifier Dynamic Fault Injection☆40Jan 12, 2026Updated last month
- ☆41Jun 6, 2021Updated 4 years ago
- Breaking Secure Boot with SMM☆41Apr 5, 2022Updated 3 years ago
- Fiddler抓包Header信息转换器,可以将Fiddler抓包信息中的Header转为Java和C#代码,以及ApiPost可导入的Json☆10Mar 26, 2022Updated 3 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- ☆12Feb 8, 2021Updated 5 years ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- Des références pour se faire une culture de sécurité informatique.☆12Dec 19, 2024Updated last year
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated 2 months ago
- ☆10May 12, 2022Updated 3 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- This AppEngine sample application is designed to process your Waze CCP JSON Feed into; BigQuery GIS tables for analysis, Google Cloud Sto…☆11Dec 12, 2023Updated 2 years ago
- First edition of the annual beginner CTF by havce.☆13Dec 18, 2022Updated 3 years ago
- driver manual mapper☆12Feb 22, 2020Updated 6 years ago
- Fitness OSINT Resources☆15Jul 21, 2023Updated 2 years ago
- Tools for reading and writing identification EEPROMs on NVIDIA Jetson platforms.☆16Sep 26, 2025Updated 5 months ago
- ☆96Jun 18, 2024Updated last year