ChrisTheCoolHut / Firmware_SlapLinks
Discovering vulnerabilities in firmware through concolic analysis and function clustering.
☆476Updated 4 years ago
Alternatives and similar repositories for Firmware_Slap
Users that are interested in Firmware_Slap are comparing it to the libraries listed below
Sorting:
- ☆614Updated 2 years ago
- INFILTRATE 2019 Demo Materials☆339Updated 2 years ago
- Detect, analyze and uniquely identify crashes in Windows applications☆513Updated 3 months ago
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆607Updated 2 years ago
- Broadcom and Cypress firmware emulation for fuzzing and further full-stack debugging☆443Updated last year
- Manul is a coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS☆338Updated 5 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆650Updated last month
- EMUX Firmware Emulation Framework (formerly ARMX)☆755Updated this week
- Python core of avatar²☆556Updated 4 months ago
- IDA Python Embedded Toolkit -- IDAPython scripts for automating analysis of firmware of embedded devices☆681Updated 6 years ago
- Using Intel's PIN tool to solve CTF problems☆500Updated 5 years ago
- The Damn Vulnerable Router Firmware Project☆696Updated 4 years ago
- a tool to analyze filesystem images for security☆503Updated last year
- BootStomp: a bootloader vulnerability finder☆407Updated 3 years ago
- Linux Heap Exploitation Practice☆385Updated 6 years ago
- The 'exploitable' GDB plugin☆740Updated 3 years ago
- How to build an efficient pwn development environment in 2020☆266Updated 4 years ago
- A TCP/UDP based network daemon fuzzer☆520Updated last year
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆386Updated 2 years ago
- the Network Protocol Fuzzer that we will want to use.☆772Updated last year
- Port of devttyS0's IDA plugins to the Ghidra plugin framework, new plugins as well.☆491Updated 4 years ago
- A thorough library database to assist with binary exploitation tasks.☆198Updated 3 years ago
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆414Updated 3 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆223Updated 4 years ago
- Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)☆946Updated 3 years ago
- A fuzzing tool for closed-source binaries based on Unicorn and LibFuzzer☆341Updated 6 years ago
- AFL/QEMU fuzzing with full-system emulation.☆636Updated 6 years ago
- gdbghidra - a visual bridge between a GDB session and GHIDRA☆321Updated 5 years ago
- Bucket and triage on-disk crashes. OSX and Linux.☆357Updated 10 months ago
- ☆219Updated 2 years ago