anfractuosity / ramrecoveryLinks
Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into RAM and recovers after powering off/on again.
☆103Updated last year
Alternatives and similar repositories for ramrecovery
Users that are interested in ramrecovery are comparing it to the libraries listed below
Sorting:
- Visualize binary files☆133Updated this week
- Playing NES ROMs with Ghidra's PCode Emulator☆102Updated last year
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆108Updated 7 months ago
- ☆128Updated 2 years ago
- Battery info program for x86-64 Linux laptops in 384 bytes of machine code☆60Updated last year
- Block Erasure Format - An extensible, fast, and usable file utility to encode and decode interleaved erasure coded streams of data.☆58Updated last year
- Aegir GPS/LTE/Iridium Tracker☆180Updated 11 months ago
- ☆93Updated last year
- the NSA selector eurorack module☆163Updated 3 weeks ago
- LD_PRELOADable library for exploring the glibc heap☆107Updated 6 months ago
- Hacking around lack of WebUSB support in Firefox☆243Updated 5 months ago
- A web fuzzer using the httpipe format☆101Updated last year
- Logo language in 508 bytes (x86 boot sector)☆180Updated last year
- Slapped-together tools to reprogram the BIOS on a bricked HP Envy laptop.☆24Updated 3 years ago
- Implementation of Pong that runs within a mouse's firmware and renders by moving the cursor fast enough to acheive persistence of vision☆165Updated last year
- Das originale MuxCraft System, v10.☆117Updated 3 months ago
- A very high-speed, configurable, and portable packet-crafting utility optimized for embedded devices☆79Updated 7 months ago
- create local malicious git repo☆51Updated 5 months ago
- Research and proof of concept to develop the next SecureDrop with end to end encryption.☆49Updated last week
- Detecting Inconsistencies in Feature or Function Evaluations of Requirements☆67Updated last year
- My own cybersecurity research talks/slides☆37Updated 2 years ago
- Reverse engineering and hacking 10th generation Honda Civic headunits☆135Updated 3 months ago
- A modular camera body for raspberry pi☆51Updated last year
- Set of macros that guard against buffer overflows. Based on C99 VLA feature.☆129Updated 2 years ago
- Create PCBs using a simplfiied graphics language☆102Updated 3 months ago
- ✨ rudimentary simulation of the three-body problem☆157Updated last year
- pckb -- backup 128 bits to physical medium☆177Updated 3 months ago
- abuse ImageMagick (or GraphicsMagick) to create arbitrary files☆53Updated 5 months ago
- Make USB power meters usable with the Firefox Profiler☆60Updated 3 months ago
- ☆225Updated 7 months ago