CyberDanube / medusa-embedded-toolkit
Statically compiled binaries for various architectures.
☆12Updated 2 years ago
Alternatives and similar repositories for medusa-embedded-toolkit:
Users that are interested in medusa-embedded-toolkit are comparing it to the libraries listed below
- ☆28Updated last year
- A fast, multithreaded, ROP-gadget semantics analyzer.☆49Updated 4 years ago
- Library to wrap all file calls when fuzzing with AFL++☆51Updated 2 years ago
- ☆38Updated 4 years ago
- ☆81Updated 2 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆46Updated 5 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆52Updated last year
- IDA Pro to Ghidra Key Bindings to feel like if you were in IDA Pro when navigating☆89Updated 6 years ago
- A library for patching ELFs☆55Updated 4 years ago
- Ghidra Emulates Functions☆54Updated 4 years ago
- ☆20Updated 3 years ago
- A collection of my weggli patterns to facilitate vulnerability research.☆106Updated last year
- Target components for kAFL/Nyx Fuzzer☆29Updated last month
- A central place to store statically compiled tools I use when auditing a Linux based device.☆14Updated 4 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆83Updated 2 years ago
- ☆24Updated last year
- WTF Snapshot fuzzing of macOS targets☆95Updated 11 months ago
- Linux Kernel Snapshot Fuzzer using KVM☆47Updated last year
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆60Updated 2 years ago
- ☆61Updated 2 months ago
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆68Updated 7 months ago
- A code-searching/completion tool, for IDA APIs☆83Updated 3 months ago
- Repository of the findings found by wtf when fuzzing IDA75.☆87Updated 3 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- ☆56Updated 3 months ago
- LibAFL components for stateful fuzzing☆47Updated 2 years ago
- Python GUI for seeing what's happening inside a fuzzer☆26Updated 3 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆123Updated last year
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- FirmWire has replaced ShannonEE. OLD: A dynamic analysis environment for Samsung's Shannon baseband.☆41Updated 3 years ago