Ledger-Donjon / ledger-donjon-ctf-2020Links
Ledger Donjon CTF 2020
☆17Updated 3 years ago
Alternatives and similar repositories for ledger-donjon-ctf-2020
Users that are interested in ledger-donjon-ctf-2020 are comparing it to the libraries listed below
Sorting:
- A tool to perform so called BGE attack☆24Updated last week
- ☆38Updated 4 years ago
- Automated recovery of Linux kernel build configurations☆24Updated 3 years ago
- Debugger for the Shannon Baseband☆58Updated 5 years ago
- FirmWire has replaced ShannonEE. OLD: A dynamic analysis environment for Samsung's Shannon baseband.☆41Updated 3 years ago
- RISC-V emulator for high-performance fuzzing with AOT instead of JIT compilation 🦑☆20Updated 2 weeks ago
- ☆36Updated 4 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆27Updated last year
- A fast, multithreaded, ROP-gadget semantics analyzer.☆50Updated 4 years ago
- CLKscrew Code and Scripts☆28Updated 5 years ago
- ☆18Updated 4 years ago
- Ghidra analyzer for UEFI firmware.☆19Updated last year
- A firmware base address search tool.☆45Updated last year
- StdFuzzer is the reference implementation of a generic bit-level fuzzer with LibAFL☆48Updated 6 months ago
- Side-channel traces visualizer☆15Updated last month
- QEMU enhanced with OS handlers, external plugins, and rapid analysis execution engine.☆41Updated 5 years ago
- A tool for comparing cellular layer 3 protocol messages between the specification documents and baseband implementations☆50Updated 4 years ago
- CSAW Embedded Security Challenge 2019☆34Updated 5 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 6 years ago
- ROPMate is the first Visual Analytics system specifically designed to assist human in composing ROP chains with the desired semantics.☆26Updated 4 years ago
- Tasteless CTF 2019☆20Updated 5 years ago
- Collection of images and examples to use with Shoggoth.☆19Updated 4 years ago
- ☆18Updated 3 years ago
- ☆62Updated 3 months ago
- Automate generation of syzkaller's grammar☆16Updated 2 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆25Updated 7 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆13Updated 4 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Same-Architecture Firmware Rehosting and Fuzzing☆124Updated 6 months ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆162Updated 3 years ago