ammaraskar / iClicker-base-reversingLinks
Notes and files from reverse engineering the iClicker base station
☆10Updated 6 years ago
Alternatives and similar repositories for iClicker-base-reversing
Users that are interested in iClicker-base-reversing are comparing it to the libraries listed below
Sorting:
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆57Updated 7 years ago
- Exploit generator for Intel ME 11 buffer overflow☆33Updated 5 years ago
- Intel Management Engine firmware loader plugin for IDA☆93Updated 8 years ago
- ☆51Updated last year
- Package Manager for Radare2☆137Updated this week
- Basic BIOS emulator for Unicorn Engine.☆100Updated 4 years ago
- Android bootloader (aboot) parser☆63Updated last year
- hidusb.sys source code, Windows 10 hidusb.sys fully reversed☆34Updated 8 years ago
- SIGSTOPing ELF binaries since 0x7E1☆54Updated last year
- Tool for decrypting the firmware files for Samsung SSDs☆225Updated 4 years ago
- A simple program that calculates a checksum over its own executable program memory☆11Updated 8 years ago
- Official QEMU mirror☆30Updated 2 weeks ago
- ☆97Updated 5 years ago
- Emulate native integer and floating-point types in Python☆20Updated 2 years ago
- My UEFI security talk on ZeroNights 2015☆58Updated 9 years ago
- Module to load WebAssembly files into ghidra☆102Updated 5 years ago
- Notes on QEMU and Debian MIPS (big-endian)☆45Updated 6 years ago
- ☆74Updated 7 years ago
- Small script to determine valid immediate values for ARM assembly☆19Updated 5 years ago
- Samsung Galaxy S3 GT-I9300 eMMC toolbox☆103Updated 7 years ago
- bunch of random stuff☆21Updated 5 years ago
- My binary ninja plugin that encapsulate frida, unicorn, capstone and keystone☆73Updated 7 years ago
- ☆31Updated 4 years ago
- A Unicorn based emulator to deobfuscate Equation Group string XOR obfuscation☆31Updated 6 years ago
- Ghidra plugin to communicate with radare2☆60Updated this week
- ☆45Updated 7 years ago
- It does the same thing as plugin FunctionStringAssociate for IDA, Now the script just works, in the future it is planned to increase the …☆57Updated 2 years ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆66Updated 8 years ago
- Intel ME Manufacturing Mode Detection Tools☆126Updated 6 years ago
- Qualcomm TrustZone kernel privilege escalation☆65Updated 9 years ago