使用idapython写的一个辅助二进制固件漏洞挖掘的代码审计脚本
☆47Aug 3, 2022Updated 3 years ago
Alternatives and similar repositories for Audit
Users that are interested in Audit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IDA MIPS静态扫描脚本,汇编审计辅助脚本☆17Dec 18, 2020Updated 5 years ago
- clfs CVE 的一些 POC 收集☆16Oct 27, 2022Updated 3 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- 🐍 Python Exploit for CVE-2022-0739☆11Dec 9, 2022Updated 3 years ago
- Ghidra变强术,一个Ghidra脚本库,二进制安全,PWN☆12Jan 21, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Simulate firmware with one click of firmadyne (使用 firmadyne 一键模拟固件)☆367Aug 18, 2024Updated last year
- 基于IDAPython的二进制漏洞检测脚本库,对IDA生成的反汇编文件进行静态分析,并以XML形式报告可能存在的漏洞隐患点。Based on the binary vulnerability detection script library of IDAPYTHON, th…☆61Mar 9, 2024Updated 2 years ago
- firmwalker加强版,增加了一些信息泄露关键字。☆19Mar 1, 2023Updated 3 years ago
- ☆22Jun 1, 2018Updated 7 years ago
- A simple library to intercept calls to libnvram when running embedded linux applications in emulated environments.☆255Oct 29, 2023Updated 2 years ago
- CVE-2020-16898 Windows TCP/IP远程代码执行漏洞 EXP&POC☆13Oct 28, 2020Updated 5 years ago
- ☆27Aug 6, 2022Updated 3 years ago
- 2023年西湖论剑IoT-AWD赛题仓库☆20Apr 13, 2023Updated 3 years ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆129Nov 15, 2025Updated 5 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- 一键提取vxwork固件内部文件,并依据binwalk分析结果和uboot镜像内文件名偏移表,正确恢复vxwork文件名;以及实现主要bin文件寻找和函数符号表搜索提取功能☆35Nov 28, 2024Updated last year
- 智能家居安全相关参考。The related reference of smart home security including: paper, website, topic of Mi IoT.☆76May 12, 2022Updated 3 years ago
- Dynamic Tracing in Android (fork from iovisor/ply)☆21Nov 26, 2022Updated 3 years ago
- CVE-2021-4034 POC and Docker and Analysis write up☆12May 23, 2022Updated 3 years ago
- Official repository containing files related to N1CTF 2022☆44Nov 11, 2022Updated 3 years ago
- 腾蛇系列渗透系统☆47Sep 13, 2022Updated 3 years ago
- A few resources for fuzzing☆17Sep 25, 2022Updated 3 years ago
- ☆86Jan 9, 2023Updated 3 years ago
- CVE-2021-38003 exploits extracted from https://twitter.com/WhichbufferArda/status/1609604183535284224☆38Jan 7, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Shared Library to intercept nvram get/set/match calls for emulating libnvram.so used by many IoT firmware software.☆69Aug 10, 2021Updated 4 years ago
- For anylise the router's vulnerabilities☆14Apr 8, 2020Updated 6 years ago
- ☆16Apr 12, 2023Updated 3 years ago
- ☆26Apr 13, 2022Updated 4 years ago
- IDA Pro plugin for query based searching within the binary useful mainly for vulnerability research.☆662May 13, 2025Updated 11 months ago
- A simple wav library written in pure C.☆10Apr 20, 2017Updated 9 years ago
- ☆20Nov 4, 2020Updated 5 years ago
- Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis☆858Apr 11, 2026Updated 3 weeks ago
- a tools to run qemu automatically for simulate firmware of IoT☆77Jul 18, 2025Updated 9 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Something about CTF and vulnerability environment, mainly about kernel exploit.☆47Nov 11, 2022Updated 3 years ago
- ☆16May 14, 2021Updated 4 years ago
- ctf一键栈溢出、格式化字符串pwn工具/一键pwn利用工具☆17Apr 19, 2025Updated last year
- Mobile Security Keynote☆34Oct 6, 2018Updated 7 years ago
- blog☆17Apr 27, 2020Updated 6 years ago
- POC for CLFS CVE-2022-24481☆14May 14, 2023Updated 2 years ago
- Vulnerability analyze☆17Sep 21, 2020Updated 5 years ago