timingattestation / timing-attestationLinks
Automatically exported from code.google.com/p/timing-attestation
☆13Updated 10 years ago
Alternatives and similar repositories for timing-attestation
Users that are interested in timing-attestation are comparing it to the libraries listed below
Sorting:
- Interactive Virtual Machine Introspection☆18Updated 8 years ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆30Updated 9 years ago
- ☆15Updated 5 years ago
- Recon materials☆27Updated 7 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆44Updated 9 years ago
- A TE executable format loader for IDA☆28Updated 10 years ago
- An EFI image parser and dissector☆52Updated 12 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- XED based Disassembly Engine☆20Updated 7 years ago
- Debugger for HTC phones bootloader (HBOOT).☆20Updated 11 years ago
- Visualize an ELF's execution☆11Updated 10 years ago
- Fuzzer☆43Updated 10 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 9 years ago
- ☆14Updated 9 years ago
- A GCC plugin implementing various stack canaries.☆14Updated 13 years ago
- Betraying the BIOS: Where the Guardians of the BIOS are Failing☆60Updated 8 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆28Updated 9 years ago
- Firmware analysis gone wild.☆41Updated 11 years ago
- Memory forensics of virtualization environments☆47Updated 11 years ago
- ☆24Updated 10 years ago
- In memory fuzzing for embedded devices☆19Updated 13 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆40Updated 11 years ago
- Linux hooking engine for ARM architecture☆16Updated 10 years ago
- lte security☆41Updated 9 years ago
- ☆25Updated 7 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Updated 8 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 9 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆49Updated 9 years ago
- repository with additional materials and source code☆31Updated 8 years ago