☆21Sep 25, 2023Updated 2 years ago
Alternatives and similar repositories for SplITS
Users that are interested in SplITS are comparing it to the libraries listed below
Sorting:
- ☆71May 12, 2025Updated 9 months ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- ☆10Oct 31, 2022Updated 3 years ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- ☆187Nov 29, 2023Updated 2 years ago
- ☆30Sep 13, 2024Updated last year
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆59May 20, 2025Updated 9 months ago
- Same-Architecture Firmware Rehosting and Fuzzing☆130Dec 19, 2024Updated last year
- Code lifting for executing a visionOS library os macOS using QBDL and QBDI☆21Sep 30, 2024Updated last year
- Source code of the paper "FirmRCA: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-based Fault Localization"☆13Jan 6, 2026Updated last month
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- ☆28Aug 4, 2022Updated 3 years ago
- Binary code coverage visualizer plugin for Ghidra - just without crashes on unknown insns☆20Nov 2, 2024Updated last year
- LG On Screen Phone authentication bypass PoC (CVE-2014-8757)☆15Feb 6, 2015Updated 11 years ago
- Peripheral Transplantation to Rehost Embedded Linux kernels☆16Mar 6, 2022Updated 3 years ago
- LLFuzz: An Over-the-Air Dynamic Testing Framework for Cellular Baseband Lower Layers☆55Aug 12, 2025Updated 6 months ago
- ☆330Jun 20, 2024Updated last year
- Simple commit search utility for Chromium Google Source.☆29Dec 8, 2022Updated 3 years ago
- CVE-2018-4330 POC for iOS☆17Sep 13, 2018Updated 7 years ago
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆17Feb 21, 2024Updated 2 years ago
- ☆26Jan 7, 2024Updated 2 years ago
- PoC code using debugfs to store files in memory and execute them☆27May 25, 2018Updated 7 years ago
- ☆131Oct 29, 2023Updated 2 years ago
- Fork of Synacktiv's private Lumina server☆21Feb 22, 2022Updated 4 years ago
- FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution☆22May 29, 2023Updated 2 years ago
- ☆35Feb 4, 2026Updated 3 weeks ago
- ☆25Sep 30, 2022Updated 3 years ago
- Standalone C version of the MSM8974 TrustZone exploit☆27Sep 30, 2020Updated 5 years ago
- a7 sep bug☆55Sep 26, 2023Updated 2 years ago
- Some exploits I have written to showcase and to share☆53Mar 24, 2021Updated 4 years ago
- ☆27Jul 31, 2021Updated 4 years ago
- Detect patterns of bad behavior in function calls☆25Jul 21, 2020Updated 5 years ago
- ☆25Feb 6, 2024Updated 2 years ago
- ASLR bypass without infoleak☆167Nov 2, 2021Updated 4 years ago
- Perry: automated peripheral modeling with symbolic execution☆28Jun 1, 2024Updated last year
- MacOS kernel memory leak (4 bytes)☆30Apr 14, 2020Updated 5 years ago
- ☆69May 30, 2025Updated 8 months ago
- cve-2014-4323 poc☆24Oct 15, 2015Updated 10 years ago
- ☆30Dec 4, 2018Updated 7 years ago