Mimojas Firmware Toolkit for unpacking and analysis firmware images
☆14May 23, 2020Updated 5 years ago
Alternatives and similar repositories for MFT
Users that are interested in MFT are comparing it to the libraries listed below
Sorting:
- ☆13May 5, 2018Updated 7 years ago
- A (Miasm2 + binaryninja) based function divination.☆15Oct 22, 2017Updated 8 years ago
- WiiBin is a framework to determine architecture of an unknown binary and locate opcode sections within the same binary via supervised mac…☆20Dec 16, 2025Updated 2 months ago
- A security-oriented static binary analysis tool for comparing the quantity and quality of code reuse gadget sets in program variants.☆17Oct 13, 2023Updated 2 years ago
- Tasteless CTF 2019☆20Nov 6, 2019Updated 6 years ago
- Utility to copy BIOS data from one ASUS BIOS image file to another☆27Apr 21, 2014Updated 11 years ago
- machine check exploitation☆54Aug 6, 2025Updated 6 months ago
- "Reversing WebAssembly Module 101" Workshop (NorthSec 2019, hack.lu 2019)☆22Oct 15, 2020Updated 5 years ago
- Sample firmware for UEFI-firmware parsing☆19Feb 17, 2026Updated last week
- windows-kernel-exploits Windows平台提权漏洞集合☆23Jul 29, 2021Updated 4 years ago
- ☆54Oct 15, 2018Updated 7 years ago
- Common Firmware Environment☆27Jan 24, 2019Updated 7 years ago
- TIRO - A hybrid iterative deobfuscation framework for Android applications☆27Aug 17, 2018Updated 7 years ago
- Default query sets for Joern☆27Oct 23, 2021Updated 4 years ago
- PFSExtractor rewritten in Rust☆33Feb 14, 2025Updated last year
- Set of helper utilitites for UEFI BIOS Updater project☆34Aug 14, 2015Updated 10 years ago
- ☆34Nov 11, 2021Updated 4 years ago
- ☆42May 19, 2022Updated 3 years ago
- A tracing tool to analyze the I/O behavior of a program.☆12Sep 25, 2019Updated 6 years ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆22Dec 28, 2025Updated 2 months ago
- Python infrastructure to train paths selectors for symbolic execution engines.☆13Updated this week
- A comprehensive repository for malware analysis and threat intelligence, including Cobalt Strike Beacon configurations, YARA rules, IOCs,…☆15Updated this week
- HDLBits-Solutions☆10May 27, 2022Updated 3 years ago
- 7Tsp Icons Themes For Windows as well as Some Extras. Please read the guide prior to installation☆14Nov 14, 2022Updated 3 years ago
- headless-ida-mcp-server☆29Apr 4, 2025Updated 10 months ago
- Unnoficial solutions (still under construction) to Nielsen and Chuang's "Quantum Computation and Quantum Information" - 10th anniversary …☆19Feb 11, 2026Updated 2 weeks ago
- Tools for exploiting, reverse engineering, and deploying firmware to the S3FWRN5 and S3NRN82 Samsung NFC Controllers☆100Jul 23, 2020Updated 5 years ago
- Vulnerability management tool that provides Yocto SBOM generation and CVE Analysis of target images.☆38Updated this week
- Flex 'em lexers☆42Oct 19, 2020Updated 5 years ago
- A LoRaWAN Security Evaluation Framework☆42Feb 11, 2024Updated 2 years ago
- An XrmToolBox plugin to generate Excel documentation with CRM metadata☆10Dec 11, 2025Updated 2 months ago
- ☆15Mar 21, 2024Updated last year
- Utility for making crosschain transactions on the Wanchain network☆13Mar 18, 2019Updated 6 years ago
- Alphanumeric+1 shellcoding tools for RISC-V☆37Aug 12, 2019Updated 6 years ago
- ☆11Sep 8, 2025Updated 5 months ago
- C# SDK for SecureAuth IdP API☆11May 31, 2023Updated 2 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- ☆13Mar 6, 2010Updated 15 years ago