jwise / netwatchLinks
NetWatch System Management Mode VNC Server
☆31Updated 15 years ago
Alternatives and similar repositories for netwatch
Users that are interested in netwatch are comparing it to the libraries listed below
Sorting:
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆20Updated 15 years ago
- A graphical multiplatform tool to manipulate and forward TCP connections.☆12Updated 13 years ago
- Command line tool to write to x86 boot flash chips via the PCH☆14Updated 8 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Updated 10 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- ☆24Updated 9 years ago
- EFI bios rom dumping tools☆20Updated 11 years ago
- ☆57Updated 11 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- Tool support and visualizaton of Assembly Language within Eclipse, and integrated with IDA Pro. Can also be used as a standalone executab…☆14Updated 10 years ago
- Simple binary file disassembler based on libopcodes and bfd from binutils.☆27Updated 9 years ago
- A library for efficient interception of established TCP connections☆19Updated 9 years ago
- ☆16Updated 7 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- Small and cheap standalone USB sanitizer☆43Updated 4 years ago
- Several example uses of TPM2/TSS APIs.☆10Updated 9 years ago
- ☆23Updated 9 years ago
- A 512-byte bootloader displaying ASCII Goatse on boot.☆29Updated 4 years ago
- Redress Dissassembler is a cross platform binary disassembler written in Java with Capstone bindings☆24Updated 9 years ago
- Very simple runtime hooking library for OS X.☆15Updated 9 years ago
- Firmware analysis gone wild.☆42Updated 10 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated 2 years ago
- a pocket-sized, teensy-based HID emulator used to exploit the targeted computer's trust of USB keyboards and mice.☆9Updated 9 years ago
- A strcmp timing attack example☆9Updated 10 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Samples of binary with different formats and architectures. A test suite for your binary analysis tools.☆22Updated 10 years ago
- Translate regular Assembly into Extended Instructions☆87Updated 12 years ago
- ☆10Updated 9 years ago
- Detect Malware with Sandbox/VM evasion and Anti-debugging skills with some heur☆9Updated 9 years ago