A library for performing memory forensics over the IEEE 1394 interface.
☆19Jul 8, 2018Updated 7 years ago
Alternatives and similar repositories for libforensic1394
Users that are interested in libforensic1394 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Oct 19, 2017Updated 8 years ago
- Small binja plugin to import header file to types☆17Nov 11, 2022Updated 3 years ago
- WebKit/JSC CodeQL Databases☆17Dec 15, 2025Updated 4 months ago
- Escalation of privilege exploit for Dell BIOS flasher (Flash64W) (2017)☆13Dec 7, 2020Updated 5 years ago
- Hydradancer firmware supporting the Facedancer backend for the Hydradancer dongle and HydraUSB3☆24Dec 10, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆22Jul 4, 2024Updated last year
- Tensilica Xtensa Architecture Plugin and ESP8266 Firmware Loader for Binary Ninja☆19Apr 8, 2023Updated 3 years ago
- User-mode program parsing logs created by HyperPlatform☆19Aug 15, 2016Updated 9 years ago
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆21Feb 9, 2023Updated 3 years ago
- 一个PE工具,可以解析PE结构、加壳和脱壳☆10Apr 16, 2021Updated 5 years ago
- Reload+Refresh PoC☆17Feb 26, 2020Updated 6 years ago
- ☆21Jun 17, 2022Updated 3 years ago
- A fuzzy parser for C/C++ that creates semantic code property graphs☆36Oct 15, 2020Updated 5 years ago
- A command line utility for Slack☆10Mar 17, 2016Updated 10 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- (Inverse Path | F-Secure) Hardware Security Team - Security Advisories☆24Dec 15, 2021Updated 4 years ago
- radare2 cLEMENCy plugins☆24Nov 5, 2017Updated 8 years ago
- A BinaryNinja plugin to graph a BNIL instruction tree☆90Nov 7, 2025Updated 5 months ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Jan 27, 2025Updated last year
- A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829)☆13Aug 15, 2022Updated 3 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆48Sep 28, 2016Updated 9 years ago
- Malicious use of macho, such as dump-runtime-macho, function-hook.☆15Mar 20, 2017Updated 9 years ago
- Binary Ninja loader for A12 SEP firmware☆29Feb 4, 2021Updated 5 years ago
- Easily navigate class registration data.☆12Dec 8, 2017Updated 8 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Dump Windows PE file information in C☆23May 2, 2015Updated 10 years ago
- Universal Linux Application SDK - Create once. Run everywhere.☆10Jun 25, 2018Updated 7 years ago
- An example of using dlopen to load plugins containing c++ objects at runtime☆15May 13, 2016Updated 9 years ago
- Turns virtual usbredir connections into physical ones☆14Jun 17, 2020Updated 5 years ago
- transfer ownership of any FB50 smart lock to yourself (CVE-2019-13143)☆17Aug 7, 2019Updated 6 years ago
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆40Updated this week
- bash.tricks, a poster showing a fine selection of bash commands & parameters. Print it in A1 size and put it on your wall. For geeks, hac…☆12Apr 7, 2021Updated 5 years ago
- plugin of ida with pin☆48Jan 25, 2021Updated 5 years ago
- VMCS Auditor provides almost all of Intel's VMCS Layout checklist based on Bochs Emulator.☆32Dec 7, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆20Oct 29, 2015Updated 10 years ago
- Formal verification of SecVisor, a secure hypervisor☆13Apr 23, 2013Updated 13 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Feb 13, 2017Updated 9 years ago
- A collection of Python code, useful for RF work☆13Sep 2, 2022Updated 3 years ago
- Microarchitectural exploitation and other hardware attacks.☆97Mar 25, 2024Updated 2 years ago
- ☆14Sep 24, 2012Updated 13 years ago
- Python library for musical audio synthesis☆17May 3, 2024Updated last year