DonnchaC / coldboot-attacksLinks
Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.
☆55Updated 8 years ago
Alternatives and similar repositories for coldboot-attacks
Users that are interested in coldboot-attacks are comparing it to the libraries listed below
Sorting:
- Reverse Engineering tools, scripts, and general commentary☆59Updated 6 years ago
- Password scrambler - a deterministic password re-generator (alternative to a password manager)☆131Updated 2 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 6 years ago
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆50Updated 8 months ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- Volatility plugin to extract BitLocker Full Volume Encryption Keys (FVEK)☆70Updated 4 years ago
- A GUI-based USB device fuzzer☆64Updated 8 years ago
- Miscellaneous analysis tools☆26Updated 10 years ago
- This package allows interaction with nRF24LU1+ based dongles and the RFStorm firmware.☆23Updated 6 years ago
- Repository containing many useful scripts☆75Updated 3 years ago
- Reverse engineering challenges☆52Updated 6 years ago
- scripts, etc...☆37Updated last year
- Shikra (http://int3.cc/products/the-shikra) programming utility☆44Updated 4 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 6 years ago
- X41 Smartcard Fuzzer☆120Updated 6 years ago
- ☆65Updated 9 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Updated 2 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆78Updated 6 years ago
- ☆52Updated last week
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆63Updated 7 years ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- unofficial fork of inetsim - official source at http://www.inetsim.org/ - changes in branch "pimped"☆30Updated 9 years ago
- 0-ring rootkit revealer for Linux☆29Updated 6 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Updated 4 years ago
- A few ZigBee Tools to compliment KillerBee☆55Updated 9 years ago
- Created by Jeffrey Martin via the GitHub Connector☆26Updated 10 months ago
- hax 'n shit☆121Updated 10 years ago