an open source toolkit for PCI bus exploration
☆72Dec 18, 2016Updated 9 years ago
Alternatives and similar repositories for thundergate
Users that are interested in thundergate are comparing it to the libraries listed below
Sorting:
- Simple standalone bundle of NT core APIs☆25Mar 7, 2016Updated 9 years ago
- Proof of concept exploit codes for vulnerabilities.☆11May 8, 2014Updated 11 years ago
- Debugger for HTC phones bootloader (HBOOT).☆20Nov 28, 2013Updated 12 years ago
- LPE exploits for Secret Net and Secret Net Studio☆52Mar 1, 2016Updated 10 years ago
- Dynamic Visual Debugging / Reverse Engineering Toolsuite☆251Apr 14, 2019Updated 6 years ago
- capstone based disassembler for extracting to binnavi☆229Jun 8, 2016Updated 9 years ago
- CHIPSEC module that exploits UEFI boot script table vulnerability☆134Jan 25, 2016Updated 10 years ago
- PC firmware exploitation tool and library☆260May 13, 2022Updated 3 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Sep 5, 2016Updated 9 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- Private set of tools for game hacking☆12Jan 25, 2015Updated 11 years ago
- KLEE-TAINT - Klee with taint analysis support☆71Oct 23, 2017Updated 8 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆76Oct 22, 2016Updated 9 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆28Apr 26, 2016Updated 9 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- ☆25Aug 10, 2018Updated 7 years ago
- ☆15Oct 27, 2015Updated 10 years ago
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆57Nov 29, 2016Updated 9 years ago
- XNU Rootkit Framework☆126Jan 3, 2015Updated 11 years ago
- PEI stage backdoor for UEFI compatible firmware☆228May 1, 2021Updated 4 years ago
- Guest to host VM escape exploit for Parallels Desktop☆27Nov 14, 2014Updated 11 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- My UEFI security talk on ZeroNights 2015☆58Dec 13, 2015Updated 10 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- A TE executable format loader for IDA☆28Sep 14, 2015Updated 10 years ago
- Read and write physical memory on OS X☆136Aug 14, 2015Updated 10 years ago
- Open source library that implements translator and tools for REIL (Reverse Engineering Intermediate Language)☆512May 1, 2021Updated 4 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Aug 30, 2015Updated 10 years ago
- Semantic Binary Code Analysis Framework☆124Sep 28, 2015Updated 10 years ago
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w…☆10Jul 25, 2023Updated 2 years ago
- A collection of scripts based on libclang for extracting API information from interpreters☆25Jul 10, 2012Updated 13 years ago
- ☆13Aug 12, 2015Updated 10 years ago
- The old integrity check bypass made by dude719.☆13Apr 2, 2016Updated 9 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- Enumerates very, very large directories quickly by directly using kernel syscalls. For POSIX and Windows. WARNING THIS IS OBSOLETE. USE B…☆15Aug 13, 2014Updated 11 years ago
- ☆13Jun 25, 2016Updated 9 years ago