Utility to decompress Linux swsusp hibernation file.
☆28Aug 11, 2021Updated 4 years ago
Alternatives and similar repositories for swsusp2bin
Users that are interested in swsusp2bin are comparing it to the libraries listed below
Sorting:
- Breaching physical security, and generally causing mayhem, with wireless signals☆15Mar 19, 2017Updated 9 years ago
- NetSCAN: a community detection algorithm plugin for Neo4j graph database☆18Jul 20, 2018Updated 7 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Sep 11, 2014Updated 11 years ago
- Get the current ticker information for cryptocurrencies☆12Jun 29, 2017Updated 8 years ago
- SoftWire is a class library written in object-oriented C++ for compiling assembly code. It can be used in projects to generate x86 machi…☆25May 28, 2009Updated 16 years ago
- Development tools for ESP32 on Raspberry Pi☆20Sep 25, 2016Updated 9 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Python bindings for Yeti's API☆19Sep 12, 2023Updated 2 years ago
- Technical add-on to ingest json formatted volatility memory analysis plugin outputs☆13May 21, 2018Updated 7 years ago
- ☆90Sep 18, 2017Updated 8 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- Code for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps"☆26Jul 22, 2019Updated 6 years ago
- MacOS incident Response Toolkit. Mostly written while stuck on a NJTransit train.☆20Feb 20, 2020Updated 6 years ago
- The 2017 Crypto and Privacy Village Badge☆31Jan 20, 2021Updated 5 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆56Dec 23, 2017Updated 8 years ago
- A collection of Teensy 2.0 (C) and PC (C#) files allowing on-the-fly simulation of USB peripherals from a PC.☆49Dec 22, 2012Updated 13 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- ☆11Updated this week
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Oct 4, 2016Updated 9 years ago
- GUI tool to create ROP chains using the ropper API☆159Mar 30, 2018Updated 7 years ago
- Trace ScriptBlock execution for powershell v2☆40Jan 14, 2020Updated 6 years ago
- Fetch and set configuration values for IDA Plugins☆25Nov 26, 2025Updated 3 months ago
- macOS triage is a python script to collect various macOS logs, artifacts, and other data.☆25Mar 25, 2021Updated 4 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Oct 17, 2016Updated 9 years ago
- Windows registry samples☆24Nov 18, 2018Updated 7 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- Python script to batch query the Tor Relays and Bridges☆38Mar 8, 2019Updated 7 years ago
- Powershell Functions to interact with TheHive-Project☆11Jun 27, 2019Updated 6 years ago
- Linux-KVM with rVMI extensions☆22Aug 28, 2017Updated 8 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Jun 30, 2017Updated 8 years ago
- ☆52Sep 17, 2018Updated 7 years ago
- rVMI - A New Paradigm For Full System Analysis☆359Oct 4, 2017Updated 8 years ago
- Overview Tooling Process Physical People☆49Nov 3, 2025Updated 4 months ago
- An erlang application which will connect a d3js force directed graph to an erlang VM and display process information.☆51Nov 28, 2017Updated 8 years ago
- CTF & practice exploit collection☆38Nov 30, 2016Updated 9 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 8 years ago