ChrisTheCoolHut / firmware_emulatorLinks
Emulating firmware poorly but quickly!
☆15Updated 4 years ago
Alternatives and similar repositories for firmware_emulator
Users that are interested in firmware_emulator are comparing it to the libraries listed below
Sorting:
- IDA Pro to Ghidra Key Bindings to feel like if you were in IDA Pro when navigating☆90Updated 6 years ago
- Generates `.pyi` type stubs for the entire Ghidra API☆151Updated 7 months ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆124Updated 8 years ago
- ☆188Updated 5 months ago
- Ghidra Emulates Functions☆55Updated 4 years ago
- A PCode Emulator for Ghidra.☆110Updated 4 years ago
- Linux Kernel Snapshot Fuzzer using KVM☆47Updated last year
- A code-searching/completion tool, for IDA APIs☆83Updated 7 months ago
- ☆115Updated last year
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆192Updated last year
- Use angr inside GDB. Create an angr state from the current debugger state.☆200Updated 5 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆163Updated 4 years ago
- Source code of HAL-fuzz☆154Updated 4 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆124Updated 2 years ago
- a few Ghidra scripts for dumping PCode data☆50Updated 6 years ago
- A tool for finding the one gadget RCE in libc☆77Updated 5 years ago
- My scripts for Ghidra.☆25Updated 2 years ago
- Repo for various angr ipython features to give it more of a cli feeling☆56Updated 8 months ago
- A python symbolic execution framework using radare2's ESIL (Evaluable String Intermediate Language)☆164Updated 2 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆184Updated 4 years ago
- ☆137Updated 3 years ago
- Snapshot fuzzing with KVM and LibAFL☆96Updated 3 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Updated 2 years ago
- ☆98Updated 2 years ago
- ☆58Updated 4 years ago
- Frida-based general purpose fuzzer☆219Updated 5 years ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆126Updated last year
- Research related☆89Updated 3 years ago
- A collection of resources/tools and analyses for the angr binary analysis framework.☆179Updated 3 years ago
- The new phuzzing framework!☆161Updated last year