Ledger-Donjon / ledger-donjon-ctf-2020
Ledger Donjon CTF 2020
☆17Updated 3 years ago
Alternatives and similar repositories for ledger-donjon-ctf-2020:
Users that are interested in ledger-donjon-ctf-2020 are comparing it to the libraries listed below
- Automated recovery of Linux kernel build configurations☆24Updated 3 years ago
- A tool to perform so called BGE attack☆24Updated last year
- ☆17Updated 4 years ago
- FirmWire has replaced ShannonEE. OLD: A dynamic analysis environment for Samsung's Shannon baseband.☆40Updated 3 years ago
- ☆38Updated 4 years ago
- Side-channel traces visualizer☆14Updated 4 months ago
- CSAW Embedded Security Challenge 2019☆33Updated 5 years ago
- Debugger for the Shannon Baseband☆58Updated 4 years ago
- A tool for comparing cellular layer 3 protocol messages between the specification documents and baseband implementations☆47Updated 4 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆26Updated 7 years ago
- ☆35Updated 3 years ago
- Use Ghidra Structs in Python☆29Updated 4 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆162Updated 3 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86) adapted to afl++☆44Updated 3 years ago
- StdFuzzer is the reference implementation of a generic bit-level fuzzer with LibAFL☆48Updated 3 months ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆49Updated 4 years ago
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆58Updated 8 years ago
- Ghidra analyzer for UEFI firmware.☆17Updated last year
- An open-source deterministic fault attack simulator prototype☆58Updated 4 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Updated 6 years ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆82Updated last year
- ☆49Updated 4 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆25Updated last year
- Tasteless CTF 2019☆20Updated 5 years ago
- Improving side channel analysis techniques for CTF problems.☆13Updated 4 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- Collection of images and examples to use with Shoggoth.☆19Updated 4 years ago
- ☆11Updated 3 years ago
- ☆15Updated 5 years ago