SideChannelMarvels / DarkPhoenixLinks
Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.
☆12Updated 2 years ago
Alternatives and similar repositories for DarkPhoenix
Users that are interested in DarkPhoenix are comparing it to the libraries listed below
Sorting:
- BINARLY Research Tools and PoCs☆36Updated 9 months ago
- A MBR Fuzzer☆29Updated last year
- One Bootloader to Load Them All - Research materials, Code , Etc.☆52Updated 2 years ago
- Python interface for Binexport, the Bindiff export format☆17Updated last month
- Extract VMK of BitLocker volume with TPMAndPIN protector and knowing PIN☆12Updated 9 months ago
- My malware analysis code snippets☆27Updated 2 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆12Updated last year
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- Hash collisions and their exploitations☆9Updated 3 years ago
- A tool to perform so called BGE attack☆24Updated last month
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆38Updated last year
- ☆18Updated 6 months ago
- Frida plugin for Binary Ninja☆18Updated 6 months ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- ☆26Updated 5 months ago
- A repository with UEFI research stuff☆15Updated 2 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- A collection of various exploits☆28Updated 10 months ago
- SPI flash read MitM attack PoC☆38Updated 3 years ago
- A Burp extension to enable modification of FIX messages when relayed from MitM_Relay☆15Updated 2 years ago
- Kernel Cache Decryption for iOS☆17Updated 3 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 3 years ago
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- ☆24Updated last year
- ☆28Updated 8 months ago
- ☆26Updated last year
- Golang Shlyuz Implant Implementation☆13Updated last month
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 2 years ago
- ☆8Updated 2 years ago