OSPG / binwalk
Firmware Analysis Tool
☆166Updated 5 months ago
Alternatives and similar repositories for binwalk:
Users that are interested in binwalk are comparing it to the libraries listed below
- JFFS2 filesystem extraction tool☆69Updated 2 months ago
- ☆174Updated last month
- A tool for firmware cartography☆147Updated 3 months ago
- ☆318Updated 9 months ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆251Updated 4 months ago
- ☆123Updated last year
- Flash-BASH is a Raspberry Pi based tool that uses a multiplexer to "glitch" a target device into a privileged open state.☆26Updated 3 years ago
- Binary Type Inference Ghidra Plugin☆154Updated last year
- D-Link firmware decryption PoC☆179Updated last year
- Make your Ghidra Lazy!☆146Updated 4 years ago
- A Pythonic Ghidra standard library☆166Updated this week
- Python Command-Line Ghidra Binary Diffing Engine☆619Updated 3 weeks ago
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆228Updated 3 months ago
- An educational Bochs-based snapshot fuzzer project☆169Updated 4 months ago
- A U-Boot hacking toolkit for security researchers and tinkerers☆268Updated 2 years ago
- An LLM extension for Ghidra to enable AI assistance in RE.☆185Updated 2 weeks ago
- Overview of Secure-Launch process on Qualcomm devices☆57Updated last year
- Broadcom CFE NAND dumper (uses `dn` command) - kinda crappy, use with care☆29Updated last year
- Research tools developed for Intel Wi-Fi chips☆52Updated last year
- prebuilt binaries for multiple architeture☆172Updated 2 years ago
- A faster firmware base address scanner.☆50Updated 2 years ago
- Raw binary firmware analysis software☆531Updated 10 months ago
- ☆180Updated last year
- Binarly Vulnerability Research Advisories☆171Updated last week
- Simple software tools for encoding and decoding dumps of NAND memory chips using implemented error correcting codes (ECC)☆83Updated 3 years ago
- ☆95Updated last year
- ☆92Updated 10 months ago
- Ghidra analysis plugin to locate cryptographic constants☆260Updated last year
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆232Updated last year
- A firmware base address search tool.☆349Updated 4 years ago