Tool and Usage
Why this tool?
This type of tooling could be used to attack a system via the hardware itself. It can be used to disable authentication mechanisms or implant nefarious software components.
How it works
The tool can insert a wide range of implants into the targeted system kernel. Access is provided via a mount point and makes the memory (RAM) and file systems available.
Usage and audience
PCILeech is commonly used for hardware security. Target users for this tool are forensic specialists and security professionals.
Tool review and remarks
The review and analysis of this project resulted in the following remarks for this security tool:
- + The source code of this software is available
Supported operating systems
PCILeech is known to work on Android, Linux, and Microsoft Windows.
Similar tools to PCILeech:
USB Canary monitors the devices on a system for the addition or removal of USB devices. On such an event, then an alert will be sent.
USBGuard is a software framework which allows USB device authorization policies. It defines what kind of USB devices are authorized together with a related policy regarding permissions.
This tool page was updated at . Found an improvement? Help the community by submitting an update.