sstjohn / thundergate
an open source toolkit for PCI bus exploration
☆70Updated 8 years ago
Alternatives and similar repositories for thundergate:
Users that are interested in thundergate are comparing it to the libraries listed below
- A TE executable format loader for IDA☆28Updated 9 years ago
- A place holder for Keystone repo. See https://github.com/keystone-engine/keystone for the real stuff☆67Updated 2 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆39Updated 6 years ago
- ☆38Updated 9 years ago
- NASM Standard Library for shellcode☆69Updated 8 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆44Updated 8 years ago
- Abstract Binary Format Manipulation - ELF, PE and Mach-O format☆117Updated 9 years ago
- Firmware analysis gone wild.☆42Updated 10 years ago
- SIGSTOPing ELF binaries since 0x7E1☆52Updated 7 months ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 9 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 8 years ago
- Python bindings for Intel's XED☆29Updated 8 months ago
- Stealth's 64bit injectso port☆74Updated 14 years ago
- Binary Ninja Function Annotator☆40Updated 6 years ago
- Synesthesia, implemented as Yices scripts☆93Updated 7 years ago
- Programmatic disassembly and patching☆67Updated 8 years ago
- lte security☆41Updated 9 years ago
- Collection of scripts for radare2☆28Updated 6 years ago
- ☆39Updated 12 years ago
- XED based Disassembly Engine☆19Updated 6 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 9 years ago
- Intel Management Engine firmware loader plugin for IDA☆90Updated 7 years ago
- ☆85Updated 7 years ago
- Implementation of the SMM rootkit "The Watcher"☆124Updated 3 years ago
- Automated Return-Oriented Programming Chaining☆83Updated 8 years ago
- Semantic Binary Code Analysis Framework☆125Updated 9 years ago
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆58Updated 8 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆27Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆25Updated 9 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆142Updated 10 years ago