Extracting bits from Microscope images of ROM Constants, and disassembling them into readable 8051 assembly code
☆22Mar 22, 2021Updated 4 years ago
Alternatives and similar repositories for WCH340_ROM-Extractor
Users that are interested in WCH340_ROM-Extractor are comparing it to the libraries listed below
Sorting:
- Download your Ring doorbell videos from The Cloud™☆13Dec 10, 2022Updated 3 years ago
- ☆13Jul 3, 2021Updated 4 years ago
- Extract bits from photos☆90Apr 30, 2020Updated 5 years ago
- Some WIP GameCube toolchain in Rust☆13Jun 15, 2021Updated 4 years ago
- Finding security vulnerabilities with CodeQL in C/C++☆13Mar 25, 2021Updated 4 years ago
- Python interface for Binexport, the Bindiff export format☆20Updated this week
- Install hamachi on your raspberry pi☆16Jul 26, 2025Updated 7 months ago
- A neovim plugin for visually displaying indent levels in code, even on blank lines☆12Jun 23, 2023Updated 2 years ago
- Low cost ventilator based on Dr. Jeffrey Ebin's design☆21Apr 10, 2020Updated 5 years ago
- A tool to download all a user's twitter followers☆24Feb 10, 2016Updated 10 years ago
- Microscope image stitching☆46Apr 18, 2024Updated last year
- ☆21Apr 8, 2019Updated 6 years ago
- Python implementation of the SlowLoris DoS attack.☆24Mar 19, 2017Updated 8 years ago
- Library/Driver for NXP PN7150 NFC device☆26Oct 20, 2024Updated last year
- 🔅 Reverse shell written on python3☆14Dec 12, 2020Updated 5 years ago
- PCB design for the pal dumper created by Charles MacDonald☆20Jun 25, 2017Updated 8 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Dec 2, 2021Updated 4 years ago
- valgrind fork with mmap tracing support☆24Jun 22, 2020Updated 5 years ago
- W3C Standards Vulnerability Disclosure & Handling Process and Policy☆25Jan 14, 2026Updated last month
- Detect patterns of bad behavior in function calls☆25Jul 21, 2020Updated 5 years ago
- Tool for decrypting and encrypting Pentium II microcode patches.☆29May 21, 2025Updated 9 months ago
- ☆12May 13, 2020Updated 5 years ago
- ☆16Jul 28, 2020Updated 5 years ago
- Additional resources and references for linux-exploit-suggester.sh☆30Oct 2, 2020Updated 5 years ago
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆30Apr 12, 2023Updated 2 years ago
- ☆29Apr 22, 2017Updated 8 years ago
- Use Ghidra Structs in Python☆30Mar 28, 2021Updated 4 years ago
- Platform independent Near Field Communication (NFC) library☆28Jan 22, 2021Updated 5 years ago
- Slides about HyperDbg☆39Feb 11, 2026Updated 2 weeks ago
- ☆35Feb 7, 2026Updated 3 weeks ago
- An LLVM based mini-C to Verilog High-level Synthesis tool☆39Mar 7, 2025Updated 11 months ago
- Generic exploit for all version 7 (maybe others) LM32-based AMD SMU's used in APUs (and probably works on GPUs too)☆39Aug 15, 2023Updated 2 years ago
- digital image steganography using BPCS (Bit-Plane Complexity Segmentation Steganography)☆32Aug 15, 2024Updated last year
- Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.☆32Aug 30, 2021Updated 4 years ago
- avarehelper☆12Aug 15, 2021Updated 4 years ago
- A content-filtering bypass system developed specifically to allow access to trans-related resources on public networks (libraries, school…☆27Nov 15, 2014Updated 11 years ago
- Download porn videos (Python)☆14Apr 12, 2018Updated 7 years ago
- Keypad Modules are expensive so to relace them in this video i am going to show you how you can make combinational lock using push button…☆10Mar 30, 2019Updated 6 years ago
- Target components for kAFL/Nyx Fuzzer☆36Jan 4, 2024Updated 2 years ago