carmaa / inception
Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, ExpressCard, PC Card and any other PCI/PCIe interfaces.
☆1,588Updated last year
Alternatives and similar repositories for inception:
Users that are interested in inception are comparing it to the libraries listed below
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆677Updated 2 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆999Updated 3 years ago
- Platform Security Assessment Framework☆3,024Updated this week
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,375Updated last year
- NetRipper - Smart traffic sniffing for penetration testers☆1,370Updated 2 years ago
- Architectural privilege escalation on x86☆854Updated 7 years ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,695Updated 3 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆783Updated last year
- Rekall Memory Forensic Framework☆1,948Updated 4 years ago
- LLDB MCP Integration + other helpful commands☆717Updated last month
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆956Updated 4 years ago
- Linux Exploit Suggester; based on operating system release number☆1,787Updated 10 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆771Updated 4 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,309Updated 3 years ago
- peinjector - MITM PE file infector☆603Updated 8 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,333Updated 6 years ago
- SSH man-in-the-middle tool☆1,657Updated 3 years ago
- A tool to help you write binary exploits☆611Updated 6 years ago
- Sniffs sensitive data from interface or pcap☆1,750Updated last year
- My proof-of-concept exploits for the Linux kernel☆1,470Updated 3 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆303Updated 3 years ago
- A collection of static SSH keys (public and private) that have made their way into software and hardware products.☆839Updated 2 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,660Updated 4 years ago
- Zero-Day Code Injection and Persistence Technique☆1,228Updated 2 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Updated 7 years ago
- VirtualBox E1000 Guest-to-Host Escape☆1,409Updated 6 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆653Updated 7 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,040Updated 3 years ago
- BARF : A multiplatform open source Binary Analysis and Reverse engineering Framework☆1,420Updated 5 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,600Updated 4 years ago