SideChannelMarvels / DarkPhoenix
Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.
☆12Updated 2 years ago
Alternatives and similar repositories for DarkPhoenix
Users that are interested in DarkPhoenix are comparing it to the libraries listed below
Sorting:
- A repository with UEFI research stuff☆14Updated last year
- BINARLY Research Tools and PoCs☆36Updated 7 months ago
- ☆18Updated 4 months ago
- Frida plugin for Binary Ninja☆17Updated 4 months ago
- Golang Shlyuz Implant Implementation☆12Updated 2 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆12Updated 3 years ago
- One Bootloader to Load Them All - Research materials, Code , Etc.☆51Updated 2 years ago
- A collection of various exploits☆28Updated 7 months ago
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Updated last year
- A tool to perform so called BGE attack☆24Updated last year
- ☆28Updated 6 months ago
- module for certexfil☆15Updated 2 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆12Updated last year
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- rpv-web is a browser based frontend for the rpv library☆25Updated this week
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- Tools for analyzing Windows containers and break container's isolation☆31Updated 2 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆27Updated last month
- ☆12Updated 2 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- ☆10Updated 3 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 4 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆17Updated last year
- ☆12Updated 2 years ago
- visually see issues with supported cipher suites☆16Updated 10 months ago
- Dixie Vuln Scanner Binja Plugin☆10Updated last year