Keysight / Library-IdentificationLinks
A research tool to identify the version of shared library files.
☆22Updated 8 years ago
Alternatives and similar repositories for Library-Identification
Users that are interested in Library-Identification are comparing it to the libraries listed below
Sorting:
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆57Updated 7 years ago
- Tools for analyzing hexagon code☆39Updated 9 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55Updated 9 years ago
- A set of tools based on radare2 for analysis of ROP gadgets and payloads.☆14Updated 9 years ago
- ARM rop chain gadget searcher☆38Updated 8 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆44Updated 9 years ago
- SIGSTOPing ELF binaries since 0x7E1☆55Updated last year
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆50Updated 7 years ago
- Kernel and filesystem extractor☆59Updated 2 years ago
- Python repository containing parsed standard C library function and argument information☆28Updated 7 years ago
- Test case minimizer for afl-fuzz☆26Updated 8 years ago
- A simple ISO7816 analyzer that only requires the data-stream.☆61Updated 7 years ago
- IDA Pro loader module for Infineon/Intel-based iPhone baseband firmwares☆25Updated 13 years ago
- Boring tool to launch multiple afl-fuzz instances☆52Updated 8 years ago
- REIL translation library☆36Updated 9 years ago
- Some tee/trustzone helper stuff☆54Updated 6 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- Binary and Directory tree comparison tool using Fuzzy Hashing☆84Updated 10 years ago
- Repository of the official Docker image for SideChannelMarvels.☆54Updated 7 years ago
- X41 Smartcard Fuzzer☆120Updated 6 years ago
- BADFET☆45Updated 8 years ago
- Exploiting the Semantic Gap in Trusted Execution Environments☆56Updated 5 years ago
- Some glue facilitating remote use of IDA (the Interactive DisAssembler) Python API.☆77Updated 5 years ago
- Our backup exploitation technique: fuzzing for POVs!☆24Updated 9 years ago
- Arm Episodes☆78Updated 7 years ago
- Toshiba MeP-c4 for Ghidra☆22Updated 6 years ago
- Python concolic execution framework for program analysis☆67Updated 10 years ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Updated 8 years ago
- ☆12Updated 7 years ago
- Memory inspection REPL interface☆45Updated 8 years ago