DonnchaC / coldboot-attacksLinks
Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.
☆54Updated 8 years ago
Alternatives and similar repositories for coldboot-attacks
Users that are interested in coldboot-attacks are comparing it to the libraries listed below
Sorting:
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- Reverse Engineering tools, scripts, and general commentary☆59Updated 6 years ago
- Miscellaneous analysis tools☆27Updated 10 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- Volatility plugin to extract FileVault 2 VMK's☆50Updated 4 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆43Updated 4 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆81Updated 5 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- A GUI-based USB device fuzzer☆64Updated 7 years ago
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆49Updated 5 months ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- Reverse engineering challenges☆52Updated 5 years ago
- Repository containing many useful scripts☆74Updated 3 years ago
- CLI tool to analyze PE files☆88Updated last year
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Updated 4 years ago
- This package allows interaction with nRF24LU1+ based dongles and the RFStorm firmware.☆23Updated 6 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- ☆65Updated 8 years ago
- Password scrambler - a deterministic password re-generator (alternative to a password manager)☆132Updated 2 years ago
- ☆29Updated 5 years ago
- ☆83Updated 7 years ago
- THC "R U There" network discovery tool☆28Updated 5 years ago
- VM setup for Malware RE labs☆28Updated 6 years ago
- Database of private SSL/SSH keys for embedded devices☆266Updated last year
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- Binary, Analysis, and Disassembler Radare2 Plugins for Dan32 architechture binaries☆17Updated 8 years ago