alainiamburg / PVED
Purposely Vulnerable Embedded Device
☆22Updated 7 years ago
Alternatives and similar repositories for PVED:
Users that are interested in PVED are comparing it to the libraries listed below
- ☆106Updated 9 years ago
- A few ZigBee Tools to compliment KillerBee☆52Updated 8 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- ☆137Updated 6 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆73Updated 8 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- RHme+ 2015 challenge☆111Updated 8 years ago
- Vulnerability research and development.☆25Updated 9 years ago
- Writeups for the RHME2 CTF☆13Updated 8 years ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆50Updated 6 years ago
- SIGSTOPing ELF binaries since 0x7E1☆52Updated 7 months ago
- Configuration security audit framework☆23Updated 8 years ago
- scripts and examples for using JTAG debug tools to gain root access☆176Updated 9 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆43Updated 4 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- A GUI-based USB device fuzzer☆62Updated 7 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 9 years ago
- GDB commands to aid exploit development☆44Updated 8 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 8 years ago
- A little tool to execute functions without debugging an entire executable. Originally written by Gonzalo J. Carracedo (BatchDrake).☆29Updated 10 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- ☆72Updated 6 years ago
- POLAR☆73Updated 6 years ago
- ActionScript3 dynamic instrumentation tool☆36Updated 8 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆50Updated 8 years ago
- Timing Sidechannel workshop☆29Updated 11 years ago
- Proof of concept code (which means poor code quality) for a proxy abusing unrestricted cross domain policies.☆23Updated 11 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Updated 8 years ago
- ☆73Updated 2 years ago
- ☆21Updated 7 years ago