Finds the base address of a firmware by comparing string addresses with target pointer addresses
☆54Mar 9, 2025Updated last year
Alternatives and similar repositories for allyourbase
Users that are interested in allyourbase are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A faster firmware base address scanner.☆59May 2, 2022Updated 4 years ago
- A (Miasm2 + binaryninja) based function divination.☆15Oct 22, 2017Updated 8 years ago
- WiiBin is a framework to determine architecture of an unknown binary and locate opcode sections within the same binary via supervised mac…☆20Dec 16, 2025Updated 4 months ago
- A firmware base address search tool.☆375Sep 27, 2020Updated 5 years ago
- Function signature matching and signature generation plugin for Binary Ninja☆78Nov 11, 2025Updated 5 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A tool to perform so called BGE attack☆26Jun 13, 2025Updated 10 months ago
- M1 bare metal project in Rust☆33Sep 1, 2022Updated 3 years ago
- ☆14Jun 5, 2019Updated 6 years ago
- Import CMSIS SVD files information onto your Ghidra memory map☆43Updated this week
- Repository for monolithic firmware blobs☆89Mar 10, 2022Updated 4 years ago
- ☆108Dec 5, 2024Updated last year
- Linux uhid api in Go.☆13Sep 27, 2023Updated 2 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆48Sep 28, 2016Updated 9 years ago
- Toshiba MeP-c4 for Ghidra☆22May 29, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- AMD Generic Encapsulated Software Architecture Platform Security Processor Configuration Block manipulation library☆17Dec 18, 2025Updated 4 months ago
- A modular and extendable Python tool for emulating simple SMALI code.☆92Apr 14, 2024Updated 2 years ago
- A CLI-based intercepting TLS proxy for TCP☆19Aug 31, 2022Updated 3 years ago
- Vulnerability analyze☆17Sep 21, 2020Updated 5 years ago
- ☆15Oct 27, 2022Updated 3 years ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆16Apr 13, 2024Updated 2 years ago
- Rust library for parsing a number of firmware images☆14Feb 22, 2023Updated 3 years ago
- A guide to silicon reverse engineering by optical microscophy☆14Dec 27, 2024Updated last year
- Identify JTAG ports using your favorite Arduino.☆82Dec 12, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Perry: automated peripheral modeling with symbolic execution☆29Jun 1, 2024Updated last year
- A tool for firmware cartography☆169Dec 8, 2025Updated 5 months ago
- Legacy version of GEF running for GDB+Python2☆18Jul 21, 2023Updated 2 years ago
- Generic exploit for all version 7 (maybe others) LM32-based AMD SMU's used in APUs (and probably works on GPUs too)☆41Aug 15, 2023Updated 2 years ago
- Detect and bypass Istio sidecar☆20Sep 24, 2021Updated 4 years ago
- CVE-2021-39685 Description and sample exploit for Linux USB Gadget overflow vulnerability☆14Apr 28, 2022Updated 4 years ago
- ☆30Mar 16, 2022Updated 4 years ago
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆40Jun 16, 2024Updated last year
- Real firmware fuzz-tested in P2IM paper☆25Dec 11, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Artifact for the IEEE S&P 2025 paper: "Rapid Reversing of Non-Linear CPU Cache Slice Functions: Unlocking Physical Address Leakage"☆20Apr 3, 2026Updated last month
- A Ghidra static analysis tool for locating PACMAN Gadgets☆13Sep 1, 2022Updated 3 years ago
- Multi-Agent Reinforcement Learning Environment for the card game SkyJo, compatible with PettingZoo and RLLIB☆16Feb 21, 2026Updated 2 months ago
- Transform any ARM macho executable to a dynamic library☆44Mar 14, 2025Updated last year
- A generator of weird files (binary polyglots, near polyglots...)☆15Sep 24, 2024Updated last year
- CVE-2021-36955☆14Aug 15, 2023Updated 2 years ago
- Example payload for CVE-2022-21894☆15Sep 27, 2023Updated 2 years ago