theopolis / tpm-malcryptLinks
An example malicious payload controller and obfuscator assisted by TPM-protected keys
☆39Updated 10 years ago
Alternatives and similar repositories for tpm-malcrypt
Users that are interested in tpm-malcrypt are comparing it to the libraries listed below
Sorting:
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Updated 10 years ago
- An EFI image parser and dissector☆51Updated 12 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Debugger for HTC phones bootloader (HBOOT).☆19Updated 11 years ago
- Several example uses of TPM2/TSS APIs.☆10Updated 9 years ago
- PoC kext to disable OS X anti-virus software☆15Updated 13 years ago
- repository with additional materials and source code☆31Updated 8 years ago
- LD_PRELOAD rootkit utils☆16Updated 9 years ago
- ☆24Updated 9 years ago
- A small python module to manipulate Windows Internals Process Monitor PMF Filter files☆15Updated 6 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆16Updated 2 years ago
- ☆15Updated 8 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- A simple exploitable ActiveX control for RE/VR☆19Updated 10 years ago
- Various libraries focused on examining/parsing NTFS-specific structures☆16Updated 9 years ago
- lojax_uefi_rootkit_checker☆18Updated 6 years ago
- Primitive TE to PE32 converter☆34Updated 3 months ago
- ☆11Updated 10 years ago
- Tool to resolve symbols by the address of the binary☆15Updated 6 years ago
- IDA recompiler☆31Updated 10 years ago
- Firmware analysis gone wild.☆42Updated 10 years ago
- Remote execution tool☆14Updated 11 years ago
- lkm rootkit☆15Updated 11 years ago
- ☆28Updated 3 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆28Updated 10 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆56Updated 7 years ago
- Anti-AV compilation☆43Updated 11 years ago
- Shellcode tracer☆15Updated 9 years ago