corkami / corkami.github.ioLinks
Website
☆21Updated 2 years ago
Alternatives and similar repositories for corkami.github.io
Users that are interested in corkami.github.io are comparing it to the libraries listed below
Sorting:
- Assesses CPU security of embedded devices. #nsacyber☆141Updated 9 years ago
- International Journal of Proof-of-Concept or Get The F*** Out (PoC||GTFO or PoC or GTFO)☆185Updated last year
- Private keys that have become public ...☆185Updated this week
- ☆453Updated last year
- Public Profile Repository for Rekall Memory Forensic.☆101Updated 5 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago
- ☆147Updated 9 years ago
- Conference slides and White-papers☆360Updated 6 years ago
- Database of private SSL/SSH keys for embedded devices☆269Updated last year
- Decept Network Protocol Proxy☆279Updated 3 years ago
- The kernel patch and userspace tools to enable Linux software write blocking☆152Updated 5 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- I hacked Minesweeper into putting flags on all the mined squares when starting. Yoohoo.☆66Updated 7 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆187Updated 3 years ago
- Linux bind shell with anti-reverse engineering techniques☆291Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- rVMI - A New Paradigm For Full System Analysis☆359Updated 8 years ago
- Auxiliary documentation and scripts around "A Reasonably Safe Travel Burner Laptop"☆242Updated 3 months ago
- A boot record parser that identifies known good signatures for MBR, VBR and IPL.☆95Updated 11 months ago
- ☆19Updated 7 years ago
- Hacker OPSEC☆101Updated 7 years ago
- random brain dumps☆351Updated 8 years ago
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆276Updated 5 years ago
- Linux Memory Cryptographic Keys Extractor☆239Updated 2 years ago
- Binary exploitation CTF challenge☆24Updated 7 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 9 years ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 7 years ago
- CANAPE Network Testing Tool☆184Updated 8 years ago
- Your bag of handy codes for malware researchers☆120Updated 5 years ago
- ☆384Updated 13 years ago