This is the source code for P2IM paper (accepted to Usenix Security'20)
☆142Oct 14, 2023Updated 2 years ago
Alternatives and similar repositories for p2im
Users that are interested in p2im are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆64Oct 14, 2023Updated 2 years ago
- Real firmware fuzz-tested in P2IM paper☆24Dec 11, 2020Updated 5 years ago
- Unit test firmware evaluated in P2IM paper☆12Jul 2, 2021Updated 4 years ago
- A Universal MCU Firmware Emulator for Dynamic Analysis without Any Hardware Dependence.☆148Nov 20, 2023Updated 2 years ago
- ☆165Oct 6, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This is the source code for AIM paper (accepted to IEEE Transactions on Dependable and Secure Computing in 2023)☆30Jul 22, 2024Updated last year
- ☆27Jul 31, 2021Updated 4 years ago
- Source code of HAL-fuzz☆157Feb 4, 2021Updated 5 years ago
- Perry: automated peripheral modeling with symbolic execution☆28Jun 1, 2024Updated last year
- Fuzzware's main repository. Start here to install.☆368Dec 18, 2025Updated 3 months ago
- Recent security papers on firmware analysis☆78Aug 30, 2021Updated 4 years ago
- FIRM-AFL is the first high-throughput greybox fuzzer for IoT firmware.☆459Mar 22, 2024Updated 2 years ago
- ☆11Jul 4, 2023Updated 2 years ago
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆425Sep 18, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆10Oct 31, 2022Updated 3 years ago
- ☆18Dec 16, 2024Updated last year
- A Specification-Guided Approach for Firmware Emulation☆45Apr 22, 2025Updated 11 months ago
- Same-Architecture Firmware Rehosting and Fuzzing☆130Dec 19, 2024Updated last year
- Repository for monolithic firmware blobs☆89Mar 10, 2022Updated 4 years ago
- ☆94Mar 31, 2025Updated last year
- Real firmware fuzz-tested with uEmu☆13Mar 22, 2023Updated 3 years ago
- ☆67Sep 3, 2020Updated 5 years ago
- Main HALucinator branch☆52Feb 23, 2026Updated last month
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆47Jul 15, 2022Updated 3 years ago
- ☆53Jun 23, 2025Updated 9 months ago
- ☆73Oct 25, 2024Updated last year
- ☆32Apr 28, 2022Updated 3 years ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆86Mar 22, 2024Updated 2 years ago
- A framework for lifting ARM32 to LLVM-IR and merging resulting code with LLVM-IR generated from source-code.☆12Oct 20, 2022Updated 3 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆47Sep 2, 2023Updated 2 years ago
- Peripheral Transplantation to Rehost Embedded Linux kernels☆16Mar 6, 2022Updated 4 years ago
- Platform for emulation and dynamic analysis of Linux-based firmware☆2,060Jul 21, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- High-Efficiency eXpanded Coverage for Improved Testing of Executables☆25Jul 7, 2022Updated 3 years ago
- QilingLab challenge writeup☆22Sep 25, 2021Updated 4 years ago
- FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution☆22May 29, 2023Updated 2 years ago
- Artifacts for CO3: Concolic Co-execution for Firmware☆13Dec 30, 2024Updated last year
- Fuzzing with the generated argument and environment variable☆10Jul 14, 2022Updated 3 years ago
- ☆188Nov 29, 2023Updated 2 years ago
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆344Dec 12, 2024Updated last year