PurpleVsGreen / beacownLinks
☆129Updated 3 years ago
Alternatives and similar repositories for beacown
Users that are interested in beacown are comparing it to the libraries listed below
Sorting:
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆103Updated last year
- Playing NES ROMs with Ghidra's PCode Emulator☆102Updated 2 years ago
- Intel Management Engine JTAG Proof of Concept☆145Updated 5 years ago
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- GPU rootkit PoC by Team Jellyfish☆119Updated 10 years ago
- A collection of Ghidra scripts, including the GPT-3 powered code analyser and annotator, G-3PO.☆310Updated 2 years ago
- ☆115Updated 2 years ago
- edgedressing leverages a Windows "feature" in order to force a target's Edge browser to open. This browser is then directed to a URL of …☆51Updated 11 months ago
- PageBuster - dump all executable pages of packed processes.☆204Updated 4 years ago
- My Analysis of the VC4 Assembly Code from the RPI4☆35Updated 9 months ago
- Hello, World! written in seemingly "gibberish" x86 assembly using obfuscation on the assembly and machine code -level☆43Updated 2 years ago
- Determine which CPU architecture is used in a binary file.☆124Updated 8 months ago
- Linux i386 tool to load and execute ME modules.☆136Updated 4 years ago
- Damn Vulnerable UEFI☆293Updated last year
- easylkb - Easy Linux Kernel Builder☆359Updated last year
- C Compiler which targets Excel (MS Office)☆288Updated 5 years ago
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆121Updated 3 weeks ago
- ☆70Updated 2 years ago
- Utility to find hidden Linux kernel modules☆146Updated 4 months ago
- ☆112Updated 2 years ago
- Visualize binary files☆133Updated 2 months ago
- Reverse engineering and hacking 10th generation Honda Civic headunits☆136Updated 5 months ago
- CLI tool, Ghidra plug-in, and Haskell library for analyzing binaries using under-constrained symbolic execution☆123Updated this week
- The first analysis framework for CPU microcode☆404Updated 2 years ago
- LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems (ACSAC 2021)☆67Updated 3 years ago
- Ghidra analyzer for UEFI firmware.☆372Updated last year
- The world's worst kernel module☆300Updated 4 years ago
- this URL is also malicious(?!) shell script☆144Updated 7 months ago
- iTLB multihit PoC☆42Updated 2 years ago
- abuse ImageMagick (or GraphicsMagick) to create arbitrary files☆54Updated last month