使用idapython写的一个辅助二进制固件漏洞挖掘的代码审计脚本
☆47Aug 3, 2022Updated 3 years ago
Alternatives and similar repositories for Audit
Users that are interested in Audit are comparing it to the libraries listed below
Sorting:
- clfs CVE 的一些 POC 收集☆16Oct 27, 2022Updated 3 years ago
- ☆21Jun 1, 2018Updated 7 years ago
- CVE-2021-4034 POC and Docker and Analysis write up☆12May 23, 2022Updated 3 years ago
- Hide the memory of the process in the Linux kernel.☆10Dec 8, 2020Updated 5 years ago
- Ghidra变强术,一个Ghidra脚本库,二进制安全,PWN☆12Jan 21, 2024Updated 2 years ago
- DrayTek Vigor password recovery, config & firmware tools☆11Jul 18, 2015Updated 10 years ago
- A small tool to patch PE files' import address table with an external payload DLL.☆16Feb 15, 2026Updated 2 weeks ago
- ☆12Mar 15, 2020Updated 5 years ago
- 🐍 Python Exploit for CVE-2022-0739☆11Dec 9, 2022Updated 3 years ago
- IDA MIPS静态扫描脚本,汇编审计辅助脚本☆17Dec 18, 2020Updated 5 years ago
- Reverse Shell x86☆16Jan 6, 2019Updated 7 years ago
- CVE-2020-16898 Windows TCP/IP远程代码执行漏洞 EXP&POC☆13Oct 28, 2020Updated 5 years ago
- ☆27Aug 6, 2022Updated 3 years ago
- 一键提取vxwork固件内部文件,并依据binwalk分析结果和uboot镜像内文件名偏移表,正确恢复vxwork文件名;以及实现主要bin文件寻找和函数符号表搜索提取功能☆33Nov 28, 2024Updated last year
- 基于IDAPython的二进制漏洞检测脚本库,对IDA生成的反汇编文件进行静态分析,并以XML形式报告可能存在的漏洞隐患点。Based on the binary vulnerability detection script library of IDAPYTHON, th…☆60Mar 9, 2024Updated last year
- A CTF fuzz powerd by protobuf.☆15May 24, 2022Updated 3 years ago
- ☆15Dec 27, 2022Updated 3 years ago
- ☆16Apr 12, 2023Updated 2 years ago
- Simulate firmware with one click of firmadyne (使用 firmadyne 一键模拟固件)☆367Aug 18, 2024Updated last year
- Works about detecting vulnerable using ML.☆87May 2, 2020Updated 5 years ago
- ☆86Jan 9, 2023Updated 3 years ago
- For anylise the router's vulnerabilities☆14Apr 8, 2020Updated 5 years ago
- 使用fscan联动Xray☆16Jul 28, 2021Updated 4 years ago
- POC for CLFS CVE-2022-24481☆14May 14, 2023Updated 2 years ago
- Blizzard CTF 2017: Sombra True Random Number Generator (STRNG).☆17May 20, 2018Updated 7 years ago
- ☆16Apr 7, 2023Updated 2 years ago
- Mobile Security Keynote☆34Oct 6, 2018Updated 7 years ago
- ☆155May 2, 2025Updated 10 months ago
- State-based Network AttacK Explorer (SNAKE) code☆14Sep 6, 2019Updated 6 years ago
- Dynamic Tracing in Android (fork from iovisor/ply)☆21Nov 26, 2022Updated 3 years ago
- Dice CTF 2022 breach write-up☆15Feb 14, 2022Updated 4 years ago
- CVE-2021-36955☆14Aug 15, 2023Updated 2 years ago
- ☆18May 6, 2025Updated 10 months ago
- CVE-2021-38003 exploits extracted from https://twitter.com/WhichbufferArda/status/1609604183535284224☆38Jan 7, 2023Updated 3 years ago
- IDA Pro plugin for query based searching within the binary useful mainly for vulnerability research.☆658May 13, 2025Updated 9 months ago
- A few resources for fuzzing☆16Sep 25, 2022Updated 3 years ago
- blog☆16Apr 27, 2020Updated 5 years ago
- Vulnerability analyze☆17Sep 21, 2020Updated 5 years ago
- ☆72May 15, 2023Updated 2 years ago