A library for performing memory forensics over the IEEE 1394 interface.
☆19Jul 8, 2018Updated 7 years ago
Alternatives and similar repositories for libforensic1394
Users that are interested in libforensic1394 are comparing it to the libraries listed below
Sorting:
- ☆12Oct 19, 2017Updated 8 years ago
- fork from A-Protect☆10Nov 26, 2018Updated 7 years ago
- Small binja plugin to import header file to types☆18Nov 11, 2022Updated 3 years ago
- ☆10May 26, 2016Updated 9 years ago
- WebKit/JSC CodeQL Databases☆17Dec 15, 2025Updated 3 months ago
- Escalation of privilege exploit for Dell BIOS flasher (Flash64W) (2017)☆13Dec 7, 2020Updated 5 years ago
- Hydradancer firmware supporting the Facedancer backend for the Hydradancer dongle and HydraUSB3☆23Dec 10, 2025Updated 3 months ago
- Tensilica Xtensa Architecture Plugin and ESP8266 Firmware Loader for Binary Ninja☆17Apr 8, 2023Updated 2 years ago
- Reload+Refresh PoC☆16Feb 26, 2020Updated 6 years ago
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆21Feb 9, 2023Updated 3 years ago
- 一个PE工具,可以解析PE结构、加壳和脱壳☆10Apr 16, 2021Updated 4 years ago
- A fuzzy parser for C/C++ that creates semantic code property graphs☆37Oct 15, 2020Updated 5 years ago
- (Inverse Path | F-Secure) Hardware Security Team - Security Advisories☆24Dec 15, 2021Updated 4 years ago
- IDA AArch64 processor extender extension: Adding support for ARMv8.5 memory tagging extension opcodes☆27Jul 6, 2020Updated 5 years ago
- IDA Database Importer plugin for Binary Ninja☆38Sep 13, 2024Updated last year
- Capstone disassembly/disassembler framework: Core (Arm, Arm64, M68K, Mips, PPC, Sparc, SystemZ, X86, X86_64, XCore) + bindings (Python, J…☆15May 18, 2019Updated 6 years ago
- radare2 cLEMENCy plugins☆24Nov 5, 2017Updated 8 years ago
- A BinaryNinja plugin to graph a BNIL instruction tree☆89Nov 7, 2025Updated 4 months ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Jan 27, 2025Updated last year
- A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829)☆13Aug 15, 2022Updated 3 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆48Sep 28, 2016Updated 9 years ago
- Malicious use of macho, such as dump-runtime-macho, function-hook.☆15Mar 20, 2017Updated 9 years ago
- QEMU with rVMI extensions☆25Jul 25, 2017Updated 8 years ago
- Binary Ninja loader for A12 SEP firmware☆29Feb 4, 2021Updated 5 years ago
- RFCat scripts to dump HCS keeloq encoder data☆13Sep 25, 2016Updated 9 years ago
- Dump Windows PE file information in C☆24May 2, 2015Updated 10 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Jun 19, 2014Updated 11 years ago
- Turns virtual usbredir connections into physical ones☆14Jun 17, 2020Updated 5 years ago
- transfer ownership of any FB50 smart lock to yourself (CVE-2019-13143)☆16Aug 7, 2019Updated 6 years ago
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆39Mar 4, 2026Updated 2 weeks ago
- bash.tricks, a poster showing a fine selection of bash commands & parameters. Print it in A1 size and put it on your wall. For geeks, hac…☆12Apr 7, 2021Updated 4 years ago
- JavaScript interpreter written in Go☆18Aug 16, 2015Updated 10 years ago
- VMCS Auditor provides almost all of Intel's VMCS Layout checklist based on Bochs Emulator.☆32Dec 7, 2018Updated 7 years ago
- Rekall Memory Forensic Framework☆33Aug 5, 2019Updated 6 years ago
- Formal verification of SecVisor, a secure hypervisor☆13Apr 23, 2013Updated 12 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Feb 13, 2017Updated 9 years ago
- A collection of Python code, useful for RF work☆13Sep 2, 2022Updated 3 years ago
- Microarchitectural exploitation and other hardware attacks.☆96Mar 25, 2024Updated last year
- symbol dumps of iOS shared caches☆34Oct 15, 2022Updated 3 years ago