A small utility to read and write to Macs physical memory using default AppleHWAccess.kext.
☆25Sep 3, 2015Updated 10 years ago
Alternatives and similar repositories for readphysmem
Users that are interested in readphysmem are comparing it to the libraries listed below
Sorting:
- A kernel extension to mitigate Gatekeeper bypasses☆49Nov 9, 2015Updated 10 years ago
- Read and write physical memory on OS X☆136Aug 14, 2015Updated 10 years ago
- Hook libc syscalls on Mac OS X☆23Jan 25, 2017Updated 9 years ago
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- Chrome extension for blocking x-origin cookies☆12Jul 5, 2016Updated 9 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Jul 22, 2012Updated 13 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Integrity checking script for Apple Thunderbolt to Ethernet adapters, to check for attacks similar to Thunderstrike 2☆26Aug 7, 2015Updated 10 years ago
- ☆15Jan 14, 2016Updated 10 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆11Oct 10, 2015Updated 10 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆22Sep 27, 2009Updated 16 years ago
- Why hunt when you can seine?☆21May 12, 2015Updated 10 years ago
- fun stuff☆79Mar 26, 2016Updated 9 years ago
- search and collect windows files from multiple locations on machine and store in one centralized directory☆20Aug 29, 2012Updated 13 years ago
- Patch kextd using radare2☆16Apr 10, 2015Updated 10 years ago
- ☆36Feb 18, 2013Updated 13 years ago
- Experimental: Windows .text section compare - disk versus memory☆15Jan 21, 2015Updated 11 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- Session hijacking GUI tool☆15Oct 20, 2013Updated 12 years ago
- enable kmem without rebooting☆23May 6, 2012Updated 13 years ago
- A OS X crypto ransomware PoC☆89Sep 4, 2015Updated 10 years ago
- A Mach-O Load Command deobfuscator.☆43Nov 25, 2021Updated 4 years ago
- A tool that uses your iPhone or iPod Touch's AES engine to calculate keys/ivs for IPSW files.☆24Feb 21, 2014Updated 12 years ago
- vstruct based dissectors for various file/protocol formats☆15Jul 27, 2017Updated 8 years ago
- Some tools for EFI hackery☆41Feb 25, 2012Updated 14 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Mar 15, 2013Updated 12 years ago
- An EFI image parser and dissector☆52Mar 20, 2013Updated 12 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- PS Vita Webkit Exploit / Mini SDK and Testing Framework☆34Nov 6, 2014Updated 11 years ago
- An x86 PC emulator☆23Feb 22, 2013Updated 13 years ago
- Collection of modified open fuzzer.☆30Jun 9, 2012Updated 13 years ago
- Everything about Parasite and more.☆21Apr 7, 2016Updated 9 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago