MagpieRYL / arm32_base_loc
A tool to locate the base address of arm32-little-end firmware binary. ##ARM固件加载基址定位
☆34Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for arm32_base_loc
- ☆32Updated 2 years ago
- IoT Security Papers☆48Updated 4 years ago
- some ida script☆30Updated 3 years ago
- A IDAPython script for searching overflows by IDA.☆21Updated 7 years ago
- ☆25Updated 5 years ago
- 基于angr的污点分析引擎☆37Updated 5 years ago
- 一个快速搭建任何版本环境的工具、使用chroot具备环境隔离、ida自动加载DWARF、被调试程序输入输出重定向等功能☆13Updated 3 years ago
- ☆41Updated 7 years ago
- Shared Library to intercept nvram get/set/match calls for emulating libnvram.so used by many IoT firmware software.☆56Updated 3 years ago
- Prebuilt statically linked gdbserver and gawk executables for Linux on ARMEL, MIPS/MIPSEL and more platforms for use on embedded devices,…☆47Updated 7 years ago
- android kernel pwn☆19Updated 5 years ago
- records of my daily sec learning☆13Updated 4 years ago
- VxWorks Fuzzer with AFL and QEMU☆48Updated 4 years ago
- A Coverage-Based fuzzing tools☆22Updated 3 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆27Updated 2 years ago
- ☆98Updated 3 years ago
- ☆15Updated 9 years ago
- ☆54Updated last year
- 2019 Advent Calendar, vmware pwnables☆49Updated 4 years ago
- ☆9Updated 4 years ago
- AFLNW: network wrapper for AFL☆45Updated 8 months ago
- Qemu Fuzzer.针对Qemu模拟设备的模糊测试工具,主要思路是Host生成种子Data,然后传递给Guest中转程序,由中转程序访问MMIO,以达到和模拟设备的交互,不同于qtest自带的fuzzer.☆44Updated 2 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆46Updated 7 years ago
- 本科毕设. Fast-Symbolic-Emulation-Engine. 因受够了 angr 诞生的项目,当年帮我solve了很多ctf题目,不过很少维护了,后面可能会用来做一些其他的程序分析,反混淆也是不错. ( 暖心tips: 设置private再public会丢失s…☆4Updated 2 years ago
- ☆28Updated 2 years ago
- ☆13Updated 3 years ago
- ☆84Updated 2 years ago
- Rizzo plugin by devttys0, ported to IDA 7☆56Updated 6 years ago