Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.
☆54Feb 9, 2017Updated 9 years ago
Alternatives and similar repositories for coldboot-attacks
Users that are interested in coldboot-attacks are comparing it to the libraries listed below
Sorting:
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Feb 6, 2017Updated 9 years ago
- Simple Python Elgamal Encryption and Decryption Tool☆10Jan 7, 2020Updated 6 years ago
- Frequency domain method to determine band occupancy and modulation parameters for an ensemble of communication signals☆12Aug 24, 2017Updated 8 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Mar 7, 2020Updated 5 years ago
- Slides from "Betta hide yo downlinks (Building a budget friendly Az/El tracker)" presentation at Cyberspectrum #21☆14Aug 3, 2017Updated 8 years ago
- ☆18Feb 19, 2025Updated last year
- his program shows you IMSI numbers, country, brand and operator of cellphones around you. /!\ This program was made to understand how GS…☆12Dec 27, 2018Updated 7 years ago
- Exploits Oracle 9i XDB ftp password buffer overflow vulnerability☆11Jun 27, 2015Updated 10 years ago
- ☆16May 4, 2017Updated 8 years ago
- A ptrace based sandbox. (PoC)☆14Jun 3, 2018Updated 7 years ago
- Universal LAN-based SSRF Attack Primitive☆19Aug 10, 2019Updated 6 years ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20May 15, 2025Updated 9 months ago
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- Collect computer related materials and codes☆20Jan 16, 2026Updated last month
- Scan for giveaways of fake Mobile Base Stations to detect them.☆21May 19, 2016Updated 9 years ago
- PCILeech HP iLO4 Service☆24Jan 9, 2019Updated 7 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- The grey fox☆25Jun 22, 2016Updated 9 years ago
- HP Power Manager 'formExportDataLogs' Buffer Overflow☆22Aug 13, 2017Updated 8 years ago
- Simple network tools written with Scapy.☆23Mar 22, 2016Updated 9 years ago
- Symbolic Execution over Falcon IL☆30Aug 28, 2021Updated 4 years ago
- Learning about disassembling☆20Oct 28, 2019Updated 6 years ago
- ☆26Mar 12, 2020Updated 5 years ago
- A simple python scanner to detect vulnerable hosts in your net☆21May 15, 2017Updated 8 years ago
- Detect patterns of bad behavior in function calls☆25Jul 21, 2020Updated 5 years ago
- Qiwi у тебя в терминале! (Бета версия)☆11May 5, 2021Updated 4 years ago
- Example Python and R code for Cloudera Machine Learning (CML) training☆14Dec 1, 2020Updated 5 years ago
- Reporting Tips for Penetration Testers☆31Jun 9, 2021Updated 4 years ago
- ☆12May 13, 2020Updated 5 years ago
- coldboot-tools☆33May 12, 2020Updated 5 years ago
- Python script for automating the download of nessus reports☆27Aug 3, 2022Updated 3 years ago
- Network Tools☆34Nov 28, 2023Updated 2 years ago
- Example of building and running an eBPF program in Rust☆33Sep 27, 2018Updated 7 years ago
- Triconex TriStation utilities and tools☆80Jan 21, 2019Updated 7 years ago
- A trimmed down sane API for using ZkTeco fingerprint reader usb devices☆13Nov 20, 2023Updated 2 years ago
- ⭕️💰 Network monitoring solution to detect crypto-mining on local machines.☆31Jun 27, 2018Updated 7 years ago
- DeltaV™ Edge Environment provides easy and secure access to DeltaV data for use on premise or in the cloud for monitoring, analytics, rep…☆11Nov 24, 2025Updated 3 months ago
- Capturing audio (.wav) from target using a link☆12Feb 21, 2020Updated 6 years ago