DonnchaC / coldboot-attacksLinks
Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.
☆54Updated 8 years ago
Alternatives and similar repositories for coldboot-attacks
Users that are interested in coldboot-attacks are comparing it to the libraries listed below
Sorting:
- A GUI-based USB device fuzzer☆64Updated 8 years ago
- Tools for viewing and extracting HDD firmware files☆77Updated 11 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- Reverse Engineering tools, scripts, and general commentary☆59Updated 6 years ago
- This package allows interaction with nRF24LU1+ based dongles and the RFStorm firmware.☆23Updated 6 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 6 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆44Updated 4 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- Miscellaneous analysis tools☆25Updated 10 years ago
- Reverse engineering challenges☆52Updated 6 years ago
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆50Updated 9 months ago
- Password scrambler - a deterministic password re-generator (alternative to a password manager)☆131Updated 3 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Updated 4 years ago
- ☆65Updated 9 years ago
- Volatility plugin to extract FileVault 2 VMK's☆51Updated 4 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆78Updated 6 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 6 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- X41 Smartcard Fuzzer☆120Updated 7 years ago
- Intro to Assembly Optimization stream repo☆28Updated 4 years ago
- A few ZigBee Tools to compliment KillerBee☆55Updated 9 years ago
- 0-ring rootkit revealer for Linux☆29Updated 6 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆132Updated 12 years ago
- simple shellcode generator☆114Updated 8 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 6 years ago
- scripts, etc...☆37Updated last year
- Repository containing many useful scripts☆75Updated 3 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 8 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Updated 5 years ago