DonnchaC / coldboot-attacksLinks
Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.
☆54Updated 8 years ago
Alternatives and similar repositories for coldboot-attacks
Users that are interested in coldboot-attacks are comparing it to the libraries listed below
Sorting:
- Reverse Engineering tools, scripts, and general commentary☆58Updated 6 years ago
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆48Updated 4 months ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- Repository containing many useful scripts☆74Updated 3 years ago
- This package allows interaction with nRF24LU1+ based dongles and the RFStorm firmware.☆23Updated 6 years ago
- ☆65Updated 8 years ago
- Tools for viewing and extracting HDD firmware files☆74Updated 10 years ago
- Miscellaneous analysis tools☆27Updated 10 years ago
- UEFI keylogger prototype☆10Updated 8 years ago
- ☆84Updated 7 years ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- A GUI-based USB device fuzzer☆64Updated 7 years ago
- Reverse engineering challenges☆51Updated 5 years ago
- CLI tool to analyze PE files☆88Updated 11 months ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆81Updated 5 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- scripts, etc...☆37Updated last year
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆143Updated 5 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆43Updated 4 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆97Updated 5 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Updated 4 years ago
- ☆43Updated 5 years ago
- Volatility plugin to extract BitLocker Full Volume Encryption Keys (FVEK)☆69Updated 3 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 7 years ago
- Binary, Analysis, and Disassembler Radare2 Plugins for Dan32 architechture binaries☆17Updated 8 years ago
- Password scrambler - a deterministic password re-generator (alternative to a password manager)☆130Updated 2 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- VM setup for Malware RE labs☆28Updated 6 years ago