kholia / apfs2johnLinks
FUSE driver for APFS (Apple File System)
☆11Updated 6 years ago
Alternatives and similar repositories for apfs2john
Users that are interested in apfs2john are comparing it to the libraries listed below
Sorting:
- A USB armory based USB sandbox☆21Updated 8 years ago
- Lite version of PDF X-RAY that uses no backend☆36Updated 14 years ago
- ☆36Updated 9 years ago
- Tools for viewing and extracting HDD firmware files☆76Updated 11 years ago
- Firmware analysis gone wild.☆41Updated 11 years ago
- A packer project to generate Windows EVAL images to use it on test / dev / hack / IR labs☆24Updated 4 years ago
- MS-CHAP-V2 SHOULD NOT be used...☆19Updated 3 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆57Updated 7 years ago
- Extract LZMA sections from cable modem firmware images☆20Updated 12 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆79Updated 6 years ago
- Deobfuscation utilities for HDD/SSD firmware images☆78Updated 6 years ago
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆40Updated 12 years ago
- Colorize Reached Blocks in IDA Pro using DynamoRIO drcov Output☆20Updated 2 years ago
- ☆10Updated 9 years ago
- Volatility plugin to extract FileVault 2 VMK's☆51Updated 4 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆44Updated 4 years ago
- Re-implementation of Apple's Continuity Protocol☆19Updated 5 years ago
- Tools for reverse engineering the Utimaco Firmware☆44Updated 8 years ago
- ☆84Updated 7 years ago
- SIGSTOPing ELF binaries since 0x7E1☆55Updated last year
- Reversing Samsung SecretZone. Decrypt MSR files without any password! All thanks to Francesco Picasso. Only commercial (paid) support is …☆21Updated 2 months ago
- repository with additional materials and source code☆31Updated 8 years ago
- A boot record parser that identifies known good signatures for MBR, VBR and IPL.☆96Updated 9 months ago
- Misc PoCs for various research topics☆21Updated 3 years ago
- ☆26Updated 7 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- hidusb.sys source code, Windows 10 hidusb.sys fully reversed☆34Updated 8 years ago
- Wget like tool to dump seagate memory and buffer☆69Updated 3 years ago
- Showing entropy analysis examples for different data types. example.sh was used to generate. It utilizes cyphunks libdisorder branch and …☆13Updated 10 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆40Updated 11 years ago