HexHive / USBFuzz
A Framework for fuzzing USB Drivers by Device Emulation
☆116Updated 4 years ago
Alternatives and similar repositories for USBFuzz:
Users that are interested in USBFuzz are comparing it to the libraries listed below
- ☆160Updated 3 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆160Updated 3 years ago
- ☆62Updated 4 months ago
- Repository for monolithic firmware blobs☆71Updated 3 years ago
- Automated IoT firmware fuzzing framework.☆80Updated 5 years ago
- ☆51Updated 11 months ago
- This repository contains the code for a fuzzing prototype for the OP-TEE system call interface using AFL.☆135Updated 3 years ago
- ☆44Updated 2 years ago
- A de-socketing tool that is 10x faster than desock (Preeny) in fuzzing network protocols☆83Updated 2 years ago
- Source code of HAL-fuzz☆145Updated 4 years ago
- AFL bindings for Unicorn-Engine☆74Updated 2 months ago
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆134Updated last year
- My fork of American Fuzzy Lop☆61Updated 6 years ago
- Linux Kernel Fuzzer Corpus☆132Updated this week
- ☆57Updated 10 months ago
- ☆130Updated 3 years ago
- Fuzzing Embedded Systems using Hardware Breakpoints☆182Updated last year
- This fork of QEMU enables fuzzing userspace ELF binaries under AFL++.☆82Updated last month
- Recent security papers on firmware analysis☆75Updated 3 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆42Updated last year
- Same-Architecture Firmware Rehosting and Fuzzing☆122Updated 3 months ago
- Material and examples for a presentation on static binary analysis.☆41Updated 4 years ago
- ☆186Updated 3 years ago
- Produce code coverage results with gcov from afl-fuzz test cases☆78Updated 2 months ago
- ☆178Updated last year
- A PCode Emulator for Ghidra.☆108Updated 4 years ago
- Samples of Shannon baseband firmware for research purposes.☆40Updated 3 years ago
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆60Updated last year
- Perry: automated peripheral modeling with symbolic execution☆24Updated 9 months ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆148Updated 5 years ago