kholia / apfs2johnLinks
FUSE driver for APFS (Apple File System)
☆11Updated 6 years ago
Alternatives and similar repositories for apfs2john
Users that are interested in apfs2john are comparing it to the libraries listed below
Sorting:
- Firmware analysis gone wild.☆41Updated 11 years ago
- Showing entropy analysis examples for different data types. example.sh was used to generate. It utilizes cyphunks libdisorder branch and …☆13Updated 10 years ago
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆40Updated 12 years ago
- ☆10Updated 9 years ago
- ip6.arpa scanner☆32Updated 8 years ago
- A packer project to generate Windows EVAL images to use it on test / dev / hack / IR labs☆24Updated 4 years ago
- Tools for viewing and extracting HDD firmware files☆77Updated 11 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆44Updated 4 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆78Updated 6 years ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- Volatility plugin to extract FileVault 2 VMK's☆51Updated 4 years ago
- Linux Distro for Mobile Security, Malware Analysis, and Forensics☆16Updated 10 years ago
- ☆84Updated 7 years ago
- Lite version of PDF X-RAY that uses no backend☆37Updated 14 years ago
- SIM Card tunnel for Alcatel OT-918D☆38Updated 11 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- SimBrush - SIM data carver and wrapper☆21Updated 13 years ago
- ☆36Updated 9 years ago
- Extract LZMA sections from cable modem firmware images☆20Updated 12 years ago
- ☆74Updated 7 years ago
- MS-CHAP-V2 SHOULD NOT be used...☆19Updated 3 years ago
- ☆33Updated 6 years ago
- Rogue Synergy server☆18Updated 8 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 9 years ago
- A tool to dynamically inspect macro execution in Office documents☆13Updated 9 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- advanced code generator for John the Ripper☆13Updated 7 years ago
- ☆23Updated 4 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Library and tools to access the Mac OS Hierarchical File System (HFS)☆37Updated last week