Ledger-Donjon / ledger-donjon-ctf-2020Links
Ledger Donjon CTF 2020
☆17Updated 3 years ago
Alternatives and similar repositories for ledger-donjon-ctf-2020
Users that are interested in ledger-donjon-ctf-2020 are comparing it to the libraries listed below
Sorting:
- FirmWire has replaced ShannonEE. OLD: A dynamic analysis environment for Samsung's Shannon baseband.☆43Updated 3 years ago
- A tool to perform so called BGE attack☆25Updated 2 months ago
- Debugger for the Shannon Baseband☆58Updated 5 years ago
- Side-channel traces visualizer☆15Updated 4 months ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆13Updated 5 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- A tool for comparing cellular layer 3 protocol messages between the specification documents and baseband implementations☆50Updated 4 years ago
- Files used for reproducing Fuzzware's experiments☆60Updated 2 years ago
- Finds the base address of a firmware by comparing string addresses with target pointer addresses☆51Updated 6 months ago
- Research tools developed for Intel Wi-Fi chips☆56Updated 2 months ago
- ☆38Updated 5 years ago
- A firmware base address search tool.☆43Updated last year
- ☆18Updated 4 years ago
- CSAW Embedded Security Challenge 2019☆34Updated 5 years ago
- Ghidra analyzer for UEFI firmware.☆18Updated 2 years ago
- Interface GDB-GEF with Binary Ninja☆58Updated 4 years ago
- Tasteless CTF 2019☆20Updated 5 years ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆84Updated last year
- A code skeleton of Samsung's Shannon S5000 baseband modem.☆46Updated 5 years ago
- ☆18Updated 5 years ago
- ☆53Updated last month
- Symbolic execution in radare2 with angr☆39Updated 4 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆59Updated 8 years ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 3 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆163Updated 4 years ago
- ☆36Updated 4 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Updated 4 years ago
- Some tee/trustzone helper stuff☆54Updated 5 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago