Synacktiv-contrib / pcileech_hpilo4_serviceLinks
PCILeech HP iLO4 Service
☆23Updated 6 years ago
Alternatives and similar repositories for pcileech_hpilo4_service
Users that are interested in pcileech_hpilo4_service are comparing it to the libraries listed below
Sorting:
- ☆36Updated 5 years ago
- Linux kernel module to run a userspace application when a magic packet arrives☆13Updated 7 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w…☆10Updated last year
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- Tools for viewing and extracting HDD firmware files☆73Updated 10 years ago
- ☆22Updated 4 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 3 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- Source code of my KeygenMe V7 challenge☆22Updated 6 years ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- Anything related to Ghidra☆12Updated 6 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆11Updated 3 years ago
- Crystal Anti-Exploit Protection 2012☆37Updated 5 years ago
- Rekall Memory Forensic Framework☆32Updated 5 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- Win32k Elevation of Privilege Poc☆1Updated 6 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- Simple windows backdoor command shell.☆21Updated 7 years ago
- ☆13Updated 4 years ago
- A wrapper for capstone for bearparser☆14Updated 2 years ago
- Rootkit Detector for UNIX☆61Updated last year
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- Convert a raw firmware image to an ELF file.☆14Updated 6 years ago