PurpleVsGreen / beacownLinks
☆128Updated 2 years ago
Alternatives and similar repositories for beacown
Users that are interested in beacown are comparing it to the libraries listed below
Sorting:
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆103Updated last year
- Intel Management Engine JTAG Proof of Concept☆144Updated 5 years ago
- Playing NES ROMs with Ghidra's PCode Emulator☆102Updated 2 years ago
- A collection of Ghidra scripts, including the GPT-3 powered code analyser and annotator, G-3PO.☆310Updated 2 years ago
- A framework for creating smart cards (ICC-based cards with contacts).☆134Updated last year
- easylkb - Easy Linux Kernel Builder☆354Updated last year
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- PageBuster - dump all executable pages of packed processes.☆203Updated 4 years ago
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆108Updated 7 months ago
- Linux i386 tool to load and execute ME modules.☆134Updated 4 years ago
- edgedressing leverages a Windows "feature" in order to force a target's Edge browser to open. This browser is then directed to a URL of …☆51Updated 9 months ago
- Utility to find hidden Linux kernel modules☆144Updated last month
- playing with DDR DRAM bus fault injection☆92Updated 11 months ago
- The first analysis framework for CPU microcode☆398Updated 2 years ago
- Damn Vulnerable UEFI☆286Updated last year
- Visualize binary files☆133Updated last week
- GPU rootkit PoC by Team Jellyfish☆121Updated 10 years ago
- An exploit chain for the Magic Leap One (and probably other TX2 devices)☆68Updated 4 months ago
- Determine which CPU architecture is used in a binary file.☆122Updated 6 months ago
- abuse ImageMagick (or GraphicsMagick) to create arbitrary files☆53Updated 5 months ago
- ☆70Updated 2 years ago
- create local malicious git repo☆51Updated 5 months ago
- GIF displaying its own MD5 (hashquine)☆77Updated 5 years ago
- Ghidra analyzer for UEFI firmware.☆362Updated last year
- Detecting Inconsistencies in Feature or Function Evaluations of Requirements☆67Updated last year
- Reverse engineering and hacking 10th generation Honda Civic headunits☆135Updated 3 months ago
- ☆114Updated 2 years ago
- ☆146Updated 4 years ago
- a set of simple steps to get from "I don't know WTF BBQ" to "I am service provider"☆52Updated last year
- C Compiler which targets Excel (MS Office)☆288Updated 5 years ago