0xricksanchez / dlink-decryptLinks
D-Link firmware decryption PoC
☆189Updated last year
Alternatives and similar repositories for dlink-decrypt
Users that are interested in dlink-decrypt are comparing it to the libraries listed below
Sorting:
- A simple shell script and two bash sourceable scripts used to build a static gdb-7.12 gdbserver using cross-compiler setups☆87Updated 8 years ago
- ☆33Updated 6 years ago
- prebuilt binaries for multiple architeture☆194Updated 2 years ago
- A firmware base address search tool.☆366Updated 5 years ago
- ToolSet for VxWorks Based Embedded Device Analyses☆367Updated last year
- Prebuilt statically linked gdbserver and gawk executables for Linux on ARMEL, MIPS/MIPSEL and more platforms for use on embedded devices,…☆54Updated 8 years ago
- awesome iot exploit resource☆70Updated last year
- ☆27Updated 4 years ago
- my advisory, poc, slides and scripts related to IoT/protocol security☆67Updated 3 months ago
- NVRAM emulator☆95Updated last year
- Modified luadec version to decompile TP-Link Archer C7 LUA firmware.☆31Updated 5 years ago
- Owfuzz: a WiFi protocol fuzzing tool☆242Updated 2 years ago
- ☆153Updated 11 years ago
- Shared Library to intercept nvram get/set/match calls for emulating libnvram.so used by many IoT firmware software.☆68Updated 4 years ago
- ☆298Updated 3 years ago
- The Decompressoin tool for Vxworks MINIFS☆13Updated 4 years ago
- One command to boot the QEMU system☆37Updated 3 years ago
- Raw binary firmware analysis software☆565Updated last year
- A faster firmware base address scanner.☆54Updated 3 years ago
- ☆18Updated 6 years ago
- Tool for viewing and extracting files from an UBIFS image☆282Updated 6 months ago
- Public repository of statically compiled GDB and GDBServer☆393Updated 4 years ago
- Various binaries for the mips architecture.☆329Updated last year
- A simple library to intercept calls to libnvram when running embedded linux applications in emulated environments.☆250Updated 2 years ago
- Web wrapper of niklasb/libc-database☆209Updated last year
- Standalone Utility for FACT-like extraction☆87Updated last month
- IDA Pro plugin for query based searching within the binary useful mainly for vulnerability research.☆645Updated 6 months ago
- All architecture and all version of gdbserver.☆31Updated 3 years ago
- Some Vulnerability in the some protocol are collected.☆106Updated last year
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆130Updated 3 years ago