skysafe / reblog
SkySafe Miscellaneous Reverse Engineering Blog
☆767Updated last year
Alternatives and similar repositories for reblog:
Users that are interested in reblog are comparing it to the libraries listed below
- Some stuff about Hardware Hacking☆588Updated 9 months ago
- Utility to find AES keys in running processes☆334Updated last year
- Intel Management Engine JTAG Proof of Concept☆520Updated 4 years ago
- GPU rootkit PoC by Team Jellyfish☆117Updated 9 years ago
- Ghidra analyzer for UEFI firmware.☆344Updated 10 months ago
- Intel Management Engine JTAG Proof of Concept☆142Updated 4 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆796Updated 3 years ago
- A guide and tool for cracking ssh known_hosts files with hashcat☆330Updated last year
- DNS covert channel implant for Red Teams.☆733Updated 5 years ago
- Tracking history of USB events on GNU/Linux☆1,165Updated 2 years ago
- Display, extract, and manipulate PSP firmware inside UEFI images☆631Updated 5 months ago
- VirtualBox E1000 Guest-to-Host Escape☆1,409Updated 6 years ago
- Inject a shared library (i.e. arbitrary code) into a live linux process, without ptrace☆785Updated 2 months ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆243Updated 2 years ago
- Windows x64 handcrafted token stealing kernel-mode shellcode☆507Updated last year
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victi…☆1,532Updated 5 months ago
- Avast JavaScript Interactive Shell☆670Updated 5 years ago
- Subaru StarLink persistent root code execution.☆565Updated 4 years ago
- Credentials Dumper for Linux using eBPF☆1,135Updated 7 months ago
- ☆1,491Updated 2 years ago
- Interactive CTF Exploration Tool☆1,655Updated 3 years ago
- Bluetooth Low Energy Swiss-army knife☆1,987Updated 8 months ago
- GLM uCode dumps☆288Updated 4 years ago
- Ghidra utilities for analyzing PC firmware☆423Updated 3 months ago
- Etherify - bringing the ether back to ethernet☆343Updated 3 years ago
- Scripts for the Ghidra software reverse engineering suite.☆1,076Updated 4 years ago
- ☆519Updated 3 months ago
- HiddenVM — Use any desktop OS without leaving a trace.☆2,429Updated 9 months ago
- Obuscated C Christmas programs☆377Updated 2 years ago
- Research code & papers from members of vx-underground.☆1,217Updated 3 years ago