☆71Jun 21, 2024Updated last year
Alternatives and similar repositories for Firmware-Dataset
Users that are interested in Firmware-Dataset are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆23Jun 22, 2024Updated last year
- ☆29Dec 29, 2024Updated last year
- ☆97May 4, 2025Updated 11 months ago
- FirmSec Dataset☆47Oct 15, 2025Updated 5 months ago
- An automated static taint analysis tool for the Lua web framework.☆24Sep 27, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆94Mar 31, 2025Updated last year
- Same-Architecture Firmware Rehosting and Fuzzing☆130Dec 19, 2024Updated last year
- WiiBin is a framework to determine architecture of an unknown binary and locate opcode sections within the same binary via supervised mac…☆20Dec 16, 2025Updated 3 months ago
- ☆47May 27, 2023Updated 2 years ago
- ☆11Feb 6, 2023Updated 3 years ago
- ☆10Oct 31, 2022Updated 3 years ago
- 存储iot设备分析工具和分析文件☆14May 28, 2021Updated 4 years ago
- ☆11Jul 4, 2023Updated 2 years ago
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆425Sep 18, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆22Aug 20, 2025Updated 7 months ago
- Firmrec is a recurring vulnerability detector for embedded firmware.☆50May 9, 2025Updated 11 months ago
- Full implementaion of Genius☆33May 15, 2023Updated 2 years ago
- ☆37May 11, 2022Updated 3 years ago
- CveBinarySheet: A Comprehensive Pre-built Binaries Database Focused on IoT Vulnerability Scenarios☆16Jan 17, 2025Updated last year
- Generate data-flow graph and def-use graph for a function based on miasm and IDA Pro.☆22May 17, 2022Updated 3 years ago
- ☆11Jul 2, 2025Updated 9 months ago
- Artifacts for CO3: Concolic Co-execution for Firmware☆13Dec 30, 2024Updated last year
- Recent security papers on firmware analysis☆78Aug 30, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Material and examples for a presentation on static binary analysis.☆46Mar 15, 2021Updated 5 years ago
- Source code of the paper "FirmRCA: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-based Fault Localization"☆13Jan 6, 2026Updated 3 months ago
- Toshiba MeP-c4 for Ghidra☆22May 29, 2019Updated 6 years ago
- ☆38Dec 11, 2022Updated 3 years ago
- Output high level Pcode (PcodeAST) in Ghidra☆16Apr 7, 2023Updated 3 years ago
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆344Dec 12, 2024Updated last year
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆142Oct 14, 2023Updated 2 years ago
- ☆27Apr 28, 2023Updated 2 years ago
- ☆74Nov 1, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Record my learn path of HEAP EXPLOITATION on LINUX☆14Feb 2, 2018Updated 8 years ago
- A tool for finding instruction-level equivalence between two functions.☆14Aug 26, 2025Updated 7 months ago
- ☆72Jul 24, 2025Updated 8 months ago
- ☆31May 28, 2023Updated 2 years ago
- A terminal for Windows.☆13Mar 14, 2025Updated last year
- Collections of student projects to find execution path in binary program via taint analysis using Ghidra☆18Sep 25, 2022Updated 3 years ago
- IoTVulBench is an open-source benchmark dataset for IoT security research, containing firmware-related vulnerabilities and the correspond…☆19Dec 30, 2024Updated last year