Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.
☆54Feb 9, 2017Updated 9 years ago
Alternatives and similar repositories for coldboot-attacks
Users that are interested in coldboot-attacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Feb 6, 2017Updated 9 years ago
- Collect computer related materials and codes☆20Jan 16, 2026Updated 2 months ago
- A library for performing memory forensics over the IEEE 1394 interface.☆19Jul 8, 2018Updated 7 years ago
- ☆19Feb 19, 2025Updated last year
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- Frequency domain method to determine band occupancy and modulation parameters for an ensemble of communication signals☆12Aug 24, 2017Updated 8 years ago
- Really fast knock up use at own risk etc.☆18Mar 10, 2021Updated 5 years ago
- Reporting Tips for Penetration Testers☆30Jun 9, 2021Updated 4 years ago
- Slides from "Betta hide yo downlinks (Building a budget friendly Az/El tracker)" presentation at Cyberspectrum #21☆14Aug 3, 2017Updated 8 years ago
- Implement graphic bridging from anbox on WSL2 to render program on win10☆10Jan 15, 2022Updated 4 years ago
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 7 years ago
- Brute forcing scripts for bad CTF problems☆47May 18, 2020Updated 5 years ago
- coldboot-tools☆33May 12, 2020Updated 5 years ago
- his program shows you IMSI numbers, country, brand and operator of cellphones around you. /!\ This program was made to understand how GS…☆13Dec 27, 2018Updated 7 years ago
- Corpus of crypto formats☆12Dec 2, 2022Updated 3 years ago
- DeltaV™ Edge Environment provides easy and secure access to DeltaV data for use on premise or in the cloud for monitoring, analytics, rep…☆12Nov 24, 2025Updated 4 months ago
- A working version of jmap -F☆12May 28, 2017Updated 8 years ago
- ☆31Jul 21, 2020Updated 5 years ago
- A cybersecurity dataset consisting of 4.3 million entries of Twitter, Blogs, Paper, and CVEs☆20May 26, 2023Updated 2 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆28Aug 17, 2023Updated 2 years ago
- End-to-End encrypted Tor2Web gateway☆38Oct 3, 2020Updated 5 years ago
- ASP.NET Core provides necessary APIs to implement secure access to an application.In this tutorial, we will see how to implement Role-Bas…☆11Aug 18, 2019Updated 6 years ago
- Connect your phone and display the screen on your desktop☆29Oct 14, 2014Updated 11 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆11Jul 6, 2022Updated 3 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- ☆15Jun 4, 2018Updated 7 years ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆44Sep 8, 2020Updated 5 years ago
- Triconex TriStation utilities and tools☆80Jan 21, 2019Updated 7 years ago
- Minimal ELF inspector written in C for quick binary layout inspection☆29Jan 9, 2026Updated 2 months ago
- Quickly Access and Infiltrate ADB Devices With Shodan API☆11Jul 27, 2025Updated 7 months ago
- Code snippets for bare-metal malware development☆98Feb 19, 2022Updated 4 years ago
- Proxy scraper for proxychains☆43Oct 10, 2020Updated 5 years ago
- Tooling and Scripts for Hacking Super Street Fighter II Cabinets☆18Aug 26, 2021Updated 4 years ago
- dotnetcore json based localization support☆12Dec 2, 2025Updated 3 months ago
- Este repositorio contiene los ejemplos que muestran como usar Dapper y Entity Framework Core juntos en la misma aplicación.☆13Jul 6, 2023Updated 2 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Nov 18, 2016Updated 9 years ago
- Source code of https://blahcat.github.io☆13Oct 6, 2025Updated 5 months ago
- Universal LAN-based SSRF Attack Primitive☆19Aug 10, 2019Updated 6 years ago
- ☆21Jan 7, 2019Updated 7 years ago