brainsmoke / nyanmbrLinks
Nyancat in the MBR
☆123Updated 12 years ago
Alternatives and similar repositories for nyanmbr
Users that are interested in nyanmbr are comparing it to the libraries listed below
Sorting:
- HORSEPILL rootkit PoC☆228Updated 8 years ago
- Database of private SSL/SSH keys for embedded devices☆261Updated last year
- A simple MBR hijack demonstration☆181Updated 2 years ago
- XOR cat - a command line tool to XOR a data stream with a given key☆35Updated 12 years ago
- Interactive Redundant Assembler (shell)☆96Updated 5 years ago
- Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.☆52Updated 8 years ago
- scripts and examples for using JTAG debug tools to gain root access☆178Updated 9 years ago
- Windows XP 32-Bit Bootkit☆145Updated 10 years ago
- Binary Protocol Differ☆119Updated 5 years ago
- Visual reverse engineering tool.☆277Updated 8 years ago
- NES zombie survival game made to be hacked☆253Updated 2 years ago
- Minimal RarVM Toolchain☆233Updated 9 years ago
- Global key for HID iCLASS☆42Updated 8 years ago
- Scout - Instruction based research debugger (a poor man's debugger)☆154Updated 2 years ago
- Thinkpad X220 board that disconnects the webcam and microphone data lines☆44Updated 6 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆78Updated 5 years ago
- A port of Kaitai to the Hiew hex editor☆150Updated 5 years ago
- webui repository for radare2☆95Updated 9 months ago
- A novel technique to hide code from debuggers & disassemblers☆156Updated 10 months ago
- Blogging about reversing "script kiddie" style malware.☆98Updated 9 years ago
- ☆81Updated 7 years ago
- A simple embedded Linux backdoor.☆199Updated 4 years ago
- Unlinker is a tool that can rip functions out of Visual C++ compiled binaries and produce Visual C++ COFF object files☆92Updated 7 years ago
- A low pin count sniffer for ICEStick - targeting TPM chips☆165Updated 5 years ago
- Defcon 27 "SDR Against Smart TVs: URL and Channel Injection Attacks" presentation repo☆58Updated 5 years ago
- Wolves Among the Sheep☆147Updated last year
- ☆48Updated 9 years ago
- random brain dumps☆347Updated 7 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆122Updated 11 years ago
- Reverse engineering challenges☆50Updated 5 years ago