Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.
☆54Feb 9, 2017Updated 9 years ago
Alternatives and similar repositories for coldboot-attacks
Users that are interested in coldboot-attacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Feb 6, 2017Updated 9 years ago
- Simple Python Elgamal Encryption and Decryption Tool☆10Jan 7, 2020Updated 6 years ago
- Collect computer related materials and codes☆20Jan 16, 2026Updated 3 months ago
- A library for performing memory forensics over the IEEE 1394 interface.☆19Jul 8, 2018Updated 7 years ago
- ☆20Feb 19, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- Frequency domain method to determine band occupancy and modulation parameters for an ensemble of communication signals☆12Aug 24, 2017Updated 8 years ago
- volatility☆21Nov 16, 2014Updated 11 years ago
- Really fast knock up use at own risk etc.☆18Mar 10, 2021Updated 5 years ago
- Reporting Tips for Penetration Testers☆30Jun 9, 2021Updated 4 years ago
- Slides from "Betta hide yo downlinks (Building a budget friendly Az/El tracker)" presentation at Cyberspectrum #21☆14Aug 3, 2017Updated 8 years ago
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 7 years ago
- coldboot-tools☆32May 12, 2020Updated 5 years ago
- his program shows you IMSI numbers, country, brand and operator of cellphones around you. /!\ This program was made to understand how GS…☆13Dec 27, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆16May 4, 2017Updated 9 years ago
- Corpus of crypto formats☆12Dec 2, 2022Updated 3 years ago
- Python script for automating the download of nessus reports☆27Aug 3, 2022Updated 3 years ago
- DeltaV™ Edge Environment provides easy and secure access to DeltaV data for use on premise or in the cloud for monitoring, analytics, rep…☆14Nov 24, 2025Updated 5 months ago
- Exploits Oracle 9i XDB ftp password buffer overflow vulnerability☆11Jun 27, 2015Updated 10 years ago
- Commandline utility to manually purge local copies of files on iCloud Drive☆19Jan 24, 2017Updated 9 years ago
- A cybersecurity dataset consisting of 4.3 million entries of Twitter, Blogs, Paper, and CVEs☆20May 26, 2023Updated 2 years ago
- A trimmed down sane API for using ZkTeco fingerprint reader usb devices☆14Nov 20, 2023Updated 2 years ago
- A ptrace based sandbox. (PoC)☆14Jun 3, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- End-to-End encrypted Tor2Web gateway☆38Oct 3, 2020Updated 5 years ago
- POCs for IOMemoryDescriptor racing bugs in iOS/OSX kernels☆20Jan 8, 2017Updated 9 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆11Jul 6, 2022Updated 3 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Very simple runtime hooking library for OS X.☆15Aug 9, 2015Updated 10 years ago
- Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.☆12Mar 21, 2023Updated 3 years ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆44Sep 8, 2020Updated 5 years ago
- Custom rules by cyclone☆16Dec 12, 2025Updated 4 months ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆15Mar 10, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- dotnetcore json based localization support☆12Dec 2, 2025Updated 5 months ago
- Tooling and Scripts for Hacking Super Street Fighter II Cabinets☆18Aug 26, 2021Updated 4 years ago
- Various scripts and codes☆85Apr 23, 2021Updated 5 years ago
- Este repositorio contiene los ejemplos que muestran como usar Dapper y Entity Framework Core juntos en la misma aplicación.☆13Jul 6, 2023Updated 2 years ago
- Just a simple tool to concurrently attack password-protected PKCS#12 (PFX/P12) files☆18Feb 27, 2025Updated last year
- Source code of https://blahcat.github.io☆13Oct 6, 2025Updated 6 months ago
- An ABP module helps users to define and use dynamic forms at runtime.☆14Apr 21, 2026Updated last week