PurpleVsGreen / beacownLinks
☆128Updated 2 years ago
Alternatives and similar repositories for beacown
Users that are interested in beacown are comparing it to the libraries listed below
Sorting:
- Playing NES ROMs with Ghidra's PCode Emulator☆102Updated last year
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆103Updated last year
- Intel Management Engine JTAG Proof of Concept☆142Updated 5 years ago
- A collection of Ghidra scripts, including the GPT-3 powered code analyser and annotator, G-3PO.☆312Updated 2 years ago
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- edgedressing leverages a Windows "feature" in order to force a target's Edge browser to open. This browser is then directed to a URL of …☆51Updated 8 months ago
- Reverse engineering and hacking 10th generation Honda Civic headunits☆135Updated 2 months ago
- Damn Vulnerable UEFI☆285Updated 11 months ago
- Linux i386 tool to load and execute ME modules.☆134Updated 4 years ago
- Tricking shells into interactive mode when local PTY's are not available☆145Updated 3 years ago
- easylkb - Easy Linux Kernel Builder☆348Updated last year
- My Analysis of the VC4 Assembly Code from the RPI4☆35Updated 5 months ago
- The world's worst kernel module☆298Updated 3 years ago
- PageBuster - dump all executable pages of packed processes.☆203Updated 4 years ago
- Utility to find hidden Linux kernel modules☆144Updated 2 weeks ago
- C Compiler which targets Excel (MS Office)☆288Updated 5 years ago
- Ghidra analyzer for UEFI firmware.☆355Updated last year
- Determine which CPU architecture is used in a binary file.☆121Updated 5 months ago
- A framework for creating smart cards (ICC-based cards with contacts).☆133Updated last year
- GPU rootkit PoC by Team Jellyfish☆121Updated 10 years ago
- ☆231Updated 2 years ago
- An exploit chain for the Magic Leap One (and probably other TX2 devices)☆61Updated 2 months ago
- The first analysis framework for CPU microcode☆396Updated 2 years ago
- abuse ImageMagick (or GraphicsMagick) to create arbitrary files☆53Updated 4 months ago
- LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems (ACSAC 2021)☆67Updated 3 years ago
- Hiding messages in x86 programs using semantic duals☆303Updated this week
- ☆146Updated 4 years ago
- Binary Golf Grand Prix☆112Updated last year
- ☆113Updated last year
- GIF displaying its own MD5 (hashquine)☆77Updated 5 years ago