☆69Jun 21, 2024Updated last year
Alternatives and similar repositories for Firmware-Dataset
Users that are interested in Firmware-Dataset are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆23Jun 22, 2024Updated last year
- ☆27Dec 29, 2024Updated last year
- ☆96May 4, 2025Updated 10 months ago
- FirmSec Dataset☆46Oct 15, 2025Updated 5 months ago
- An automated static taint analysis tool for the Lua web framework.☆24Sep 27, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆94Mar 31, 2025Updated 11 months ago
- Same-Architecture Firmware Rehosting and Fuzzing☆130Dec 19, 2024Updated last year
- WiiBin is a framework to determine architecture of an unknown binary and locate opcode sections within the same binary via supervised mac…☆20Dec 16, 2025Updated 3 months ago
- ☆47May 27, 2023Updated 2 years ago
- ☆11Feb 6, 2023Updated 3 years ago
- 存储iot设备分析工具和分析文件☆14May 28, 2021Updated 4 years ago
- ☆11Jul 4, 2023Updated 2 years ago
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆423Sep 18, 2021Updated 4 years ago
- ☆21Aug 20, 2025Updated 7 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Firmrec is a recurring vulnerability detector for embedded firmware.☆50May 9, 2025Updated 10 months ago
- Full implementaion of Genius☆33May 15, 2023Updated 2 years ago
- ☆37May 11, 2022Updated 3 years ago
- CveBinarySheet: A Comprehensive Pre-built Binaries Database Focused on IoT Vulnerability Scenarios☆16Jan 17, 2025Updated last year
- Generate data-flow graph and def-use graph for a function based on miasm and IDA Pro.☆22May 17, 2022Updated 3 years ago
- ☆11Jul 2, 2025Updated 8 months ago
- Artifacts for CO3: Concolic Co-execution for Firmware☆13Dec 30, 2024Updated last year
- Recent security papers on firmware analysis☆78Aug 30, 2021Updated 4 years ago
- Material and examples for a presentation on static binary analysis.☆46Mar 15, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Source code of the paper "FirmRCA: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-based Fault Localization"☆13Jan 6, 2026Updated 2 months ago
- Toshiba MeP-c4 for Ghidra☆22May 29, 2019Updated 6 years ago
- ☆38Dec 11, 2022Updated 3 years ago
- Output high level Pcode (PcodeAST) in Ghidra☆16Apr 7, 2023Updated 2 years ago
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆340Dec 12, 2024Updated last year
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆141Oct 14, 2023Updated 2 years ago
- ☆27Apr 28, 2023Updated 2 years ago
- ☆73Nov 1, 2023Updated 2 years ago
- Record my learn path of HEAP EXPLOITATION on LINUX☆14Feb 2, 2018Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆71Jul 24, 2025Updated 8 months ago
- ☆31May 28, 2023Updated 2 years ago
- Collections of student projects to find execution path in binary program via taint analysis using Ghidra☆17Sep 25, 2022Updated 3 years ago
- IoTVulBench is an open-source benchmark dataset for IoT security research, containing firmware-related vulnerabilities and the correspond…☆18Dec 30, 2024Updated last year
- ☆27Jul 31, 2021Updated 4 years ago
- QNAP NAS firmware encryption/decryption tool☆11Sep 5, 2020Updated 5 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆290Jan 31, 2026Updated last month