☆11Jul 4, 2023Updated 2 years ago
Alternatives and similar repositories for Ember-IO-Fuzzing
Users that are interested in Ember-IO-Fuzzing are comparing it to the libraries listed below
Sorting:
- A framework for lifting ARM32 to LLVM-IR and merging resulting code with LLVM-IR generated from source-code.☆12Oct 20, 2022Updated 3 years ago
- Perry: automated peripheral modeling with symbolic execution☆28Jun 1, 2024Updated last year
- ☆72Nov 1, 2023Updated 2 years ago
- Facilitating Non-Intrusive In-Vivo Firmware Testing with Stateless Instrumentation☆17Jan 28, 2026Updated last month
- Peripheral Transplantation to Rehost Embedded Linux kernels☆16Mar 6, 2022Updated 3 years ago
- ☆18Dec 13, 2022Updated 3 years ago
- A fuzzing framework for Hexagon baseband firmware using QEMU system emulation.☆129Oct 9, 2025Updated 4 months ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆47Sep 2, 2023Updated 2 years ago
- Official implementation for UniASM: Binary Code Similarity Detection without Fine-tuning.☆20Apr 6, 2023Updated 2 years ago
- ☆47Jul 15, 2022Updated 3 years ago
- ☆19Apr 7, 2023Updated 2 years ago
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆141Oct 14, 2023Updated 2 years ago
- A Ghidra extension for Golang analysis☆29May 21, 2023Updated 2 years ago
- ☆31May 28, 2023Updated 2 years ago
- Toshiba MeP-c4 for Ghidra☆22May 29, 2019Updated 6 years ago
- ☆27Jul 31, 2021Updated 4 years ago
- Golang CTF framework and exploit development module☆28Aug 31, 2021Updated 4 years ago
- ☆65Jun 21, 2024Updated last year
- Companion to the "Introduction to VirtualBox security research" Blog Post☆35Apr 26, 2022Updated 3 years ago
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆64Oct 14, 2023Updated 2 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Dec 6, 2025Updated 2 months ago
- angr源码分析☆33Jan 6, 2020Updated 6 years ago
- A Framework for fuzzing USB Drivers by Device Emulation☆130Mar 5, 2021Updated 4 years ago
- ViDeZZo source code.☆39Apr 15, 2025Updated 10 months ago
- A suite of experiments for evaluating open-source binary taint trackers.☆33Feb 15, 2022Updated 4 years ago
- Recent security papers on firmware analysis☆78Aug 30, 2021Updated 4 years ago
- Generates `.pyi` type stubs for the entire Ghidra API☆152Feb 6, 2025Updated last year
- DEFCON30 Talk Material, References and Extra Bits☆39Oct 30, 2022Updated 3 years ago
- API2Vec: Learning Representations of API Sequences for Malware Detection☆14Mar 10, 2024Updated last year
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- 🚀 每天更新最新免费节点clash,v2ray订阅链接地址,2025年便宜好用的翻墙机场推荐评测☆36Updated this week
- IoTVulBench is an open-source benchmark dataset for IoT security research, containing firmware-related vulnerabilities and the correspond…☆18Dec 30, 2024Updated last year
- ☆94Mar 31, 2025Updated 11 months ago
- ☆40Feb 3, 2026Updated 3 weeks ago
- ☆164Oct 6, 2021Updated 4 years ago
- Visualise the Data Flow Graph of the PCODE at all stages in the decompilation process☆56Apr 5, 2025Updated 10 months ago
- 😊 [NeurIPS 2024] GeoNLF: Geometry guided Pose-Free Neural LiDAR Fields☆23Mar 5, 2025Updated 11 months ago
- 福昕Foxit PDF远程代码执行漏洞CVE-2023-27363分析与复现☆11Jul 6, 2023Updated 2 years ago
- BSim signatures and databases for Ghidra to recover function symbols with☆13Jul 11, 2024Updated last year