A tool to locate the base address of arm32-little-end firmware binary. ##ARM固件加载基址定位
☆36Feb 6, 2020Updated 6 years ago
Alternatives and similar repositories for arm32_base_loc
Users that are interested in arm32_base_loc are comparing it to the libraries listed below
Sorting:
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆16Sep 11, 2020Updated 5 years ago
- A IDAPython script for searching overflows by IDA.☆21Sep 21, 2017Updated 8 years ago
- 存储iot设备分析工具和分析文件☆14May 28, 2021Updated 4 years ago
- Analyze IoT firmware☆17Apr 24, 2021Updated 4 years ago
- 作为博客☆11Apr 30, 2020Updated 5 years ago
- qemu-system by docker-compose☆13Jun 14, 2022Updated 3 years ago
- ☆30Jan 7, 2021Updated 5 years ago
- ☆12May 6, 2020Updated 5 years ago
- Scrapy spider to recursively crawl for TOR hidden services☆11Oct 12, 2017Updated 8 years ago
- ☆13Sep 22, 2025Updated 5 months ago
- The Decompressoin tool for Vxworks MINIFS☆13May 18, 2021Updated 4 years ago
- ToolSet for VxWorks Based Embedded Device Analyses☆378Sep 24, 2024Updated last year
- IDA MIPS静态扫描脚本,汇编审计辅助脚本☆17Dec 18, 2020Updated 5 years ago
- ☆11Nov 30, 2020Updated 5 years ago
- shttpd - HTTP服务器代码注释☆16Sep 12, 2020Updated 5 years ago
- A taint tracing plugin for Valgrind, unofficial mirror for https://code.google.com/p/flayer/☆16Aug 5, 2015Updated 10 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- IDAPython plugin for Tensilica Xtensa (as seen in ESP8266), version 2☆36Feb 24, 2017Updated 9 years ago
- 2020西湖论剑IOT闯关赛赛后开放资源☆57Nov 25, 2020Updated 5 years ago
- SonicWall SMA-100 Unauth RCE Exploit (CVE-2021-20038)☆97Jan 11, 2022Updated 4 years ago
- Hyper-V VMBusPipe Reversing☆22May 10, 2021Updated 4 years ago
- ☆15Feb 1, 2020Updated 6 years ago
- idb2pat plugin, fixed to work with IDA 6.2☆23Oct 8, 2011Updated 14 years ago
- Use openai to help you better translate function meanings and restore symbol tables from sub_xxxx functions☆19Jul 1, 2024Updated last year
- complete☆18Aug 11, 2019Updated 6 years ago
- POC exploit code for CVE-2020-1048(PrintDemon)☆13Jun 25, 2020Updated 5 years ago
- Generate data-flow graph and def-use graph for a function based on miasm and IDA Pro.☆22May 17, 2022Updated 3 years ago
- Get results of binaryai.cn using our SDK☆505Feb 9, 2026Updated 3 weeks ago
- 小爱音箱固件降级。☆36Apr 29, 2022Updated 3 years ago
- Proof of concept exploit about OpenSSL signature_algorithms_cert DoS flaw (CVE-2020-1967)☆20Jun 16, 2024Updated last year
- Memory forensic tool for process resurrection starting from a memory dump☆20Jun 6, 2017Updated 8 years ago
- The fuzzing framework named SHADOWFUZZER to find clientside vulnerabilities when processing incoming MQTT messages.☆20May 10, 2023Updated 2 years ago
- Router Vulnerabilities Scanner☆14Jun 1, 2020Updated 5 years ago
- 本项目是在 Windows 系统编译运行 X86 平台 VxWorks 6.6 系统,使用的模拟软件是 qemu for Windows☆40Aug 15, 2019Updated 6 years ago
- A code-searching/completion tool, for IDA APIs☆83Jan 22, 2025Updated last year
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Feb 5, 2018Updated 8 years ago
- Re-randomizing the memory layout of a process at runtime☆21May 28, 2016Updated 9 years ago
- PoC of modifying HexRays AST☆265Dec 17, 2019Updated 6 years ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆55Dec 8, 2023Updated 2 years ago