carmaa / inceptionLinks
Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, ExpressCard, PC Card and any other PCI/PCIe interfaces.
☆1,596Updated 4 months ago
Alternatives and similar repositories for inception
Users that are interested in inception are comparing it to the libraries listed below
Sorting:
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆687Updated 3 years ago
- peinjector - MITM PE file infector☆608Updated 9 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆1,006Updated 4 years ago
- Architectural privilege escalation on x86☆857Updated 7 years ago
- Extracts passwords from a KeePass 2.x database, directly from memory.☆1,019Updated 9 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,379Updated 3 years ago
- LLDB MCP Integration + other helpful commands☆736Updated 7 months ago
- Platform Security Assessment Framework☆3,133Updated last week
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆309Updated 3 years ago
- Sandboxed Execution Environment☆817Updated 5 years ago
- Rekall Memory Forensic Framework☆1,983Updated 5 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆964Updated 4 years ago
- A collection of static SSH keys (public and private) that have made their way into software and hardware products.☆847Updated 8 months ago
- Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.☆3,057Updated 4 years ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,731Updated 3 years ago
- Test DRAM for bit flips caused by the rowhammer problem☆983Updated 10 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆665Updated 7 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 10 years ago
- A tool to help you write binary exploits☆605Updated 6 years ago
- First open source and publicly available System Management Mode backdoor for UEFI based platforms. Good as general purpose playground for…☆609Updated 2 years ago
- How to backdoor Diffie-Hellman☆613Updated 9 years ago
- Deprecated Binary Ninja prototype written in Python☆524Updated 5 years ago
- Proof of Concepts (PE, PDF...)☆1,529Updated 10 months ago
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,863Updated last year
- BARF : A multiplatform open source Binary Analysis and Reverse engineering Framework☆1,433Updated 5 years ago
- Quantum Insert☆213Updated 6 years ago
- All your IPs are belong to us.☆671Updated 7 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆785Updated 5 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆802Updated last year
- (extensible) Data Exfiltration Toolkit (DET)☆827Updated 8 years ago