IDA plugin for UEFI firmware analysis and reverse engineering automation
☆14May 14, 2022Updated 3 years ago
Alternatives and similar repositories for efiXplorer
Users that are interested in efiXplorer are comparing it to the libraries listed below
Sorting:
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆11Aug 6, 2018Updated 7 years ago
- System Management RAM analysis tool☆84Aug 9, 2024Updated last year
- Windows Crypter/Decrypter Generator with AES 256 bits key - Fully Undetectable (FUD)☆18May 18, 2020Updated 5 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Aug 6, 2018Updated 7 years ago
- K8飞刀源码☆26Nov 2, 2018Updated 7 years ago
- ☆10Jun 8, 2025Updated 9 months ago
- A webpage made with gsap and Particles.js for Lively Wallpaper based on SweetKDE Wallpaper: https://github.com/EliverLara/Sweet☆12Jan 1, 2023Updated 3 years ago
- Automatic script for get over 1 million proxies over the world.☆13Apr 4, 2023Updated 2 years ago
- Build a custom PC and check the compatibility between components.☆10Aug 21, 2020Updated 5 years ago
- Instrument to capture RSSI and data of 433MHz transmissions☆12Sep 5, 2020Updated 5 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Jun 14, 2018Updated 7 years ago
- ☆12May 2, 2017Updated 8 years ago
- ☆10May 27, 2021Updated 4 years ago
- Set Lenovo BIOS settings through Intune and PowerShell☆14Oct 30, 2021Updated 4 years ago
- Awesome list of awesome website from my bookmarks. Download bookmarks also.☆11Jul 29, 2023Updated 2 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- Google Web Fonts downloader☆15Sep 6, 2014Updated 11 years ago
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- SpringCard SDK for PC/SC applications on the .NET platform☆14Jun 7, 2023Updated 2 years ago
- This project demonstrating multiple protection and anti-analysis techniques, including self-modifying code.☆14Oct 9, 2023Updated 2 years ago
- Twitch.TV application for webOS and Tizen OS☆12Feb 6, 2019Updated 7 years ago
- A py3 script to bruteforce Canary and 2 next 8 values (EBP ' RET)☆11Oct 1, 2020Updated 5 years ago
- I am a simple shell script that downloads all repositories from a user and then hunts them for sh1t.☆11Jul 21, 2022Updated 3 years ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- A tool to showcase the Therac-25 bugs☆12Jun 11, 2019Updated 6 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- convert VMWare and VirtualBox VM files to QEMU-KVM VM disk files☆10Jul 27, 2020Updated 5 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Mar 3, 2022Updated 4 years ago
- Windows DLL Loading Utility☆12Jun 11, 2020Updated 5 years ago
- Malware WinXPSP2.Cermalus Windows Kernel Virus☆14Aug 11, 2023Updated 2 years ago
- Inject any C# code into programs with lua☆18Mar 2, 2012Updated 14 years ago
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- Try to implement Hybrid Attention Net mentioned in 'Listening to Chaotic Whispers'☆11Feb 28, 2021Updated 5 years ago
- Name substitution plugin for IDA Pro☆16Mar 30, 2020Updated 5 years ago
- Zerokit shared code☆17Mar 28, 2019Updated 6 years ago
- A fast multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation.☆13Nov 14, 2023Updated 2 years ago
- anything I find interesting regarding reverse engineering☆13May 7, 2017Updated 8 years ago
- This repository has the unified data required to perform user enumeration on various websites. Content is in a JSON file and can easily b…☆13Mar 28, 2025Updated 11 months ago