carmaa / inception
Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, ExpressCard, PC Card and any other PCI/PCIe interfaces.
☆1,584Updated last year
Alternatives and similar repositories for inception:
Users that are interested in inception are comparing it to the libraries listed below
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆674Updated 2 years ago
- Platform Security Assessment Framework☆3,004Updated this week
- NetRipper - Smart traffic sniffing for penetration testers☆1,367Updated 2 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆955Updated 4 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆996Updated 3 years ago
- peinjector - MITM PE file infector☆603Updated 8 years ago
- LLDB MCP Integration + other helpful commands☆706Updated this week
- Rekall Memory Forensic Framework☆1,946Updated 4 years ago
- Architectural privilege escalation on x86☆853Updated 7 years ago
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,353Updated last year
- (extensible) Data Exfiltration Toolkit (DET)☆825Updated 7 years ago
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,662Updated last year
- A tool to help you write binary exploits☆609Updated 6 years ago
- A collection of static SSH keys (public and private) that have made their way into software and hardware products.☆839Updated last month
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆464Updated 8 months ago
- A fully featured backdoor that uses Twitter as a C&C server☆771Updated 4 years ago
- Sandboxed Execution Environment☆819Updated 4 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆301Updated 3 years ago
- An open source interactive disassembler☆1,054Updated 5 years ago
- some codes and notes about the backdoor listening on TCP-32764 in linksys WAG200G.☆1,284Updated 6 years ago
- Automated Linux evil maid attack☆426Updated 9 years ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,694Updated 3 years ago
- Extracts passwords from a KeePass 2.x database, directly from memory.☆1,007Updated 9 years ago
- First open source and publicly available System Management Mode backdoor for UEFI based platforms. Good as general purpose playground for…☆592Updated last year
- Binary analysis and management framework☆1,542Updated last year
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,308Updated 3 years ago
- BARF : A multiplatform open source Binary Analysis and Reverse engineering Framework☆1,416Updated 5 years ago
- Zero-Day Code Injection and Persistence Technique☆1,227Updated 2 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,840Updated 9 months ago
- Visual reverse engineering tool. Veles is better, use it. Don't use this.☆587Updated 4 years ago