PreOS-Security / awesome-firmware-security
Awesome Firmware Security & Other Helpful Documents
☆582Updated 5 years ago
Related projects: ⓘ
- a tool to analyze filesystem images for security☆485Updated 11 months ago
- Conference slides and White-papers☆355Updated 4 years ago
- Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Stor…☆765Updated last year
- This repo records all the vulnerabilities of linux software I have reproduced in my local workspace☆397Updated 10 months ago
- ☆580Updated last year
- Intel Management Engine JTAG Proof of Concept☆506Updated 4 years ago
- Python core of avatar²☆518Updated 9 months ago
- Kinda useful notes collated together publicly☆491Updated 5 years ago
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆467Updated 4 years ago
- A set of Linux binary exploitation tasks for beginners on various architectures☆516Updated 2 years ago
- Xori is an automation-ready disassembly and static analysis library for PE32, 32+ and shellcode☆722Updated last year
- Project Zero Docs and Tools☆698Updated 5 months ago
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆264Updated 3 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆341Updated 5 years ago
- Security, hacking conferences (list)☆486Updated last month
- An archive of low-level CTF challenges developed over the years☆598Updated 2 years ago
- The Damn Vulnerable Router Firmware Project☆667Updated 3 years ago
- A curated list of awesome projects, articles and the other materials powered by Radare2☆700Updated 4 years ago
- TPM Genie is an I2C bus interposer for discrete Trusted Platform Modules☆211Updated 3 years ago
- DARPA Challenges Sets for Linux, Windows, and macOS☆517Updated last year
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆182Updated 2 years ago
- Tear the firmware apart with your bare hands;-)☆170Updated 2 years ago
- BootStomp: a bootloader vulnerability finder☆378Updated 2 years ago
- Interactive shellcoding environment to easily craft shellcodes☆889Updated 3 years ago
- IDA Python Embedded Toolkit -- IDAPython scripts for automating analysis of firmware of embedded devices☆669Updated 5 years ago
- AFL/QEMU fuzzing with full-system emulation.☆624Updated 6 years ago
- Security Research from the Microsoft Security Response Center (MSRC)☆1,318Updated last month
- A fast, parallel test case minimization tool.☆941Updated 3 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆635Updated last month
- A Pwn2Own exploit chain☆751Updated 5 years ago