PurpleVsGreen / beacownLinks
☆129Updated 3 years ago
Alternatives and similar repositories for beacown
Users that are interested in beacown are comparing it to the libraries listed below
Sorting:
- Playing NES ROMs with Ghidra's PCode Emulator☆102Updated 2 years ago
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆104Updated last year
- Intel Management Engine JTAG Proof of Concept☆145Updated 5 years ago
- A collection of Ghidra scripts, including the GPT-3 powered code analyser and annotator, G-3PO.☆311Updated 2 years ago
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- GPU rootkit PoC by Team Jellyfish☆120Updated 10 years ago
- Utility to find hidden Linux kernel modules☆147Updated 5 months ago
- PageBuster - dump all executable pages of packed processes.☆204Updated 4 years ago
- CLI tool, Ghidra plug-in, and Haskell library for analyzing binaries using under-constrained symbolic execution☆125Updated this week
- Determine which CPU architecture is used in a binary file.☆125Updated 9 months ago
- A framework for creating smart cards (ICC-based cards with contacts).☆134Updated last year
- My Analysis of the VC4 Assembly Code from the RPI4☆35Updated 10 months ago
- Hello, World! written in seemingly "gibberish" x86 assembly using obfuscation on the assembly and machine code -level☆42Updated 2 years ago
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆123Updated 2 months ago
- Visualize binary files☆133Updated 3 months ago
- Reverse engineering and hacking 10th generation Honda Civic headunits☆138Updated 7 months ago
- C Compiler which targets Excel (MS Office)☆288Updated 5 years ago
- easylkb - Easy Linux Kernel Builder☆366Updated last year
- Damn Vulnerable UEFI☆296Updated last year
- The world's worst kernel module☆300Updated 4 years ago
- Hiding messages in x86 programs using semantic duals☆314Updated 3 weeks ago
- abuse ImageMagick (or GraphicsMagick) to create arbitrary files☆53Updated 2 months ago
- Python 2.7 bytecode d̶e̶o̶b̶f̶u̶s̶c̶a̶t̶o̶r unfucker☆208Updated 2 years ago
- The first analysis framework for CPU microcode☆412Updated 2 years ago
- An exploit chain for the Magic Leap One (and probably other TX2 devices)☆72Updated 7 months ago
- ☆232Updated 2 years ago
- Some files with nasty names☆46Updated 8 years ago
- create local malicious git repo☆51Updated 9 months ago
- a set of simple steps to get from "I don't know WTF BBQ" to "I am service provider"☆53Updated last year
- Linux i386 tool to load and execute ME modules.☆136Updated 4 years ago