theopolis / tpm-malcrypt
An example malicious payload controller and obfuscator assisted by TPM-protected keys
☆39Updated 10 years ago
Alternatives and similar repositories for tpm-malcrypt:
Users that are interested in tpm-malcrypt are comparing it to the libraries listed below
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 10 years ago
- repository with additional materials and source code☆30Updated 8 years ago
- Several example uses of TPM2/TSS APIs.☆10Updated 9 years ago
- ☆24Updated 9 years ago
- A small python module to manipulate Windows Internals Process Monitor PMF Filter files☆15Updated 6 years ago
- Debugger for HTC phones bootloader (HBOOT).☆19Updated 11 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Updated 11 years ago
- Malpimp is an advanced API tracing tool and designed to automate the reverse engineering process. In the backend it uses pydbg to hook t…☆8Updated 8 years ago
- ☆11Updated 9 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆16Updated last year
- An EFI image parser and dissector☆50Updated 11 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Updated 6 years ago
- Sample showing the use of CoGetInterceptor☆21Updated 3 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Various libraries focused on examining/parsing NTFS-specific structures☆16Updated 9 years ago
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Updated 10 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 12 years ago
- ☆27Updated 2 years ago
- lkm rootkit☆15Updated 10 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- LD_PRELOAD rootkit utils☆16Updated 9 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Updated 12 years ago
- This is a framework for automatically finding bugs, and exploiting them...☆5Updated 9 years ago
- ☆24Updated 11 years ago
- Cross-referencing network communication for detecting Advanced Persistent Threat (APT) malware☆6Updated 9 years ago
- CVE-2014-0816☆24Updated 8 years ago
- A simple exploitable ActiveX control for RE/VR☆18Updated 10 years ago