PreOS-Security / awesome-firmware-securityLinks
Awesome Firmware Security & Other Helpful Documents
☆599Updated 5 years ago
Alternatives and similar repositories for awesome-firmware-security
Users that are interested in awesome-firmware-security are comparing it to the libraries listed below
Sorting:
- a tool to analyze filesystem images for security☆502Updated last year
- Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Stor…☆810Updated 6 months ago
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆478Updated 4 years ago
- Conference slides and White-papers☆357Updated 5 years ago
- Intel Management Engine JTAG Proof of Concept☆519Updated 5 years ago
- Python core of avatar²☆552Updated 2 months ago
- ☆610Updated 2 years ago
- Tear the firmware apart with your bare hands;-)☆190Updated 3 years ago
- This repo records all the vulnerabilities of linux software I have reproduced in my local workspace☆402Updated last year
- DARPA Challenges Sets for Linux, Windows, and macOS☆526Updated last year
- An archive of low-level CTF challenges developed over the years☆635Updated 3 years ago
- Kinda useful notes collated together publicly☆493Updated 6 years ago
- Project Zero Docs and Tools☆775Updated last month
- AFL/QEMU fuzzing with full-system emulation.☆634Updated 6 years ago
- A TCP/UDP based network daemon fuzzer☆520Updated last year
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆646Updated 2 months ago
- A collection of vulnerable ARM binaries for practicing exploit development☆916Updated 3 years ago
- Broadcom and Cypress firmware emulation for fuzzing and further full-stack debugging☆444Updated last year
- The 'exploitable' GDB plugin☆733Updated 2 years ago
- TPM Genie is an I2C bus interposer for discrete Trusted Platform Modules☆213Updated 4 years ago
- IDA Python Embedded Toolkit -- IDAPython scripts for automating analysis of firmware of embedded devices☆680Updated 5 years ago
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆274Updated 4 years ago
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆609Updated 2 years ago
- BootStomp: a bootloader vulnerability finder☆401Updated 3 years ago
- Detect, analyze and uniquely identify crashes in Windows applications☆507Updated last month
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆185Updated 2 years ago
- Interactive shellcoding environment to easily craft shellcodes☆895Updated 4 years ago
- GUSTAVE is a fuzzing platform for embedded OS kernels. It is based on QEMU and AFL (and all of its forkserver siblings). It allows to fuz…☆200Updated 3 years ago
- Understand and mitigate software-observable side-channels☆501Updated 4 years ago
- Security, hacking conferences (list)☆527Updated this week