DonnchaC / coldboot-attacksLinks
Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.
☆53Updated 8 years ago
Alternatives and similar repositories for coldboot-attacks
Users that are interested in coldboot-attacks are comparing it to the libraries listed below
Sorting:
- A GUI-based USB device fuzzer☆64Updated 7 years ago
- Created by Jeffrey Martin via the GitHub Connector☆26Updated 5 months ago
- ☆65Updated 8 years ago
- Reverse Engineering tools, scripts, and general commentary☆58Updated 6 years ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- Repository containing many useful scripts☆74Updated 3 years ago
- ☆15Updated 8 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- Miscellaneous analysis tools☆27Updated 10 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 7 years ago
- 0-ring rootkit revealer for Linux☆28Updated 5 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 3 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- UEFI keylogger prototype☆10Updated 8 years ago
- CANAPE Network Testing Tool☆34Updated 6 years ago
- Binary, Analysis, and Disassembler Radare2 Plugins for Dan32 architechture binaries☆17Updated 7 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Updated 12 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆43Updated 4 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆86Updated 4 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- X41 Smartcard Fuzzer☆119Updated 6 years ago
- Reverse engineering challenges☆51Updated 5 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 6 years ago
- Volatility plugin to extract BitLocker Full Volume Encryption Keys (FVEK)☆67Updated 3 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆80Updated 5 years ago
- Firmware analysis website + API☆43Updated 4 years ago