Utility to decompress Linux swsusp hibernation file.
☆28Aug 11, 2021Updated 4 years ago
Alternatives and similar repositories for swsusp2bin
Users that are interested in swsusp2bin are comparing it to the libraries listed below
Sorting:
- Materials for 44con 2014 CANAPE Workshop☆23Sep 11, 2014Updated 11 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated last year
- Technical add-on to ingest json formatted volatility memory analysis plugin outputs☆13May 21, 2018Updated 7 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Oct 4, 2016Updated 9 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- Various tools, exploits and other short code snippets☆12Dec 25, 2018Updated 7 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆56Dec 23, 2017Updated 8 years ago
- Ruby plugin for IDAPro☆25Dec 5, 2011Updated 14 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Oct 17, 2016Updated 9 years ago
- ☆90Sep 18, 2017Updated 8 years ago
- Enumerate RIDs using pure Python☆32Jan 5, 2026Updated last month
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Aug 21, 2016Updated 9 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- Trace ScriptBlock execution for powershell v2☆40Jan 14, 2020Updated 6 years ago
- Automate generation of syzkaller's grammar☆16Nov 1, 2022Updated 3 years ago
- ☆19Dec 5, 2024Updated last year
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- Oasis is a lightweight modular framework allowing to easily write, build and patch instrumentation modules for Bluetooth Low Energy (BLE)…☆20Dec 5, 2023Updated 2 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 7 years ago
- Fetch and set configuration values for IDA Plugins☆25Nov 26, 2025Updated 3 months ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- GUI tool to create ROP chains using the ropper API☆159Mar 30, 2018Updated 7 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Jun 30, 2017Updated 8 years ago
- Collection of metasploit modules☆69Mar 1, 2017Updated 9 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- Linux-KVM with rVMI extensions☆22Aug 28, 2017Updated 8 years ago
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- Control Flow Guard Teleportation demo☆23Jul 28, 2019Updated 6 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- CTF & practice exploit collection☆38Nov 30, 2016Updated 9 years ago
- Remote Java classpath enumeration via deserialization☆22May 23, 2023Updated 2 years ago
- A toy implementation of 'Stack Guard' on top of the LLVM compiler toolchain☆24Jul 1, 2017Updated 8 years ago
- Materials from presentation☆20Jan 18, 2016Updated 10 years ago
- Reverse Engineering tool for Ethereum EVM☆20Jun 30, 2016Updated 9 years ago
- Patch to enable KGDBOC via Serial over USB. And debug Samsung Android Kernels.☆24Jun 29, 2019Updated 6 years ago
- rVMI - A New Paradigm For Full System Analysis☆359Oct 4, 2017Updated 8 years ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆51Apr 23, 2018Updated 7 years ago