eclypsium / USBAnywhereLinks
☆32Updated 5 years ago
Alternatives and similar repositories for USBAnywhere
Users that are interested in USBAnywhere are comparing it to the libraries listed below
Sorting:
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- decode bits into bytes☆46Updated 5 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆43Updated 4 years ago
- Exploit generator for Intel ME 11 buffer overflow☆33Updated 5 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- Scripts to collect microcode from CPUMicrocodes Repo and to downgrade to a compatible microcode.☆20Updated 9 months ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- Tools for viewing and extracting HDD firmware files☆74Updated 10 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆56Updated 8 years ago
- ☆74Updated 7 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆48Updated 3 months ago
- USB armory - hardware control tool☆32Updated 5 months ago
- ☆29Updated 6 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆16Updated 7 years ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- Decryption utility for PGP Whole Disk Encryption☆20Updated 3 years ago
- Conferences, tools, papers, etc.☆43Updated last month
- CPU Adventure 2 challenge from the Dragon CTF 2019☆16Updated 2 months ago
- (Linux Kernel) Stack Monitoring Tool☆45Updated 3 years ago
- Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.☆54Updated 8 years ago
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆39Updated 12 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 7 years ago
- Firmware analysis gone wild.☆42Updated 10 years ago
- PCILeech HP iLO4 Service☆23Updated 6 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆57Updated 7 years ago
- Platform Firmware Auditing Tool☆131Updated 6 years ago
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- ☆84Updated 7 years ago