antoniovazquezblanco / GhidraDeviceTreeBlobLinks
Import Device Tree Information onto your Ghidra memory map
☆19Updated this week
Alternatives and similar repositories for GhidraDeviceTreeBlob
Users that are interested in GhidraDeviceTreeBlob are comparing it to the libraries listed below
Sorting:
- Import CMSIS SVD files information onto your Ghidra memory map☆20Updated last week
- Ghidra analysis plugin to locate cryptographic constants☆49Updated last week
- Reverse engineering the TI AM3358 boot ROM☆53Updated 10 months ago
- nanoMIPS module for Ghidra☆51Updated 7 months ago
- MediaTek BP firmware tools☆60Updated last year
- Finds the base address of a firmware by comparing string addresses with target pointer addresses☆49Updated 3 months ago
- A Ghidra processor module for the EFI Byte Code (EBC)☆31Updated 5 years ago
- ☆30Updated last month
- Research tools developed for Intel Wi-Fi chips☆54Updated 2 weeks ago
- A faster firmware base address scanner.☆52Updated 3 years ago
- ☆52Updated 2 years ago
- Better Apple binary analysis for Ghidra☆126Updated last week
- A framework for researching the interface between the iPhone's application processor and its baseband☆46Updated 8 months ago
- Dalvik bytecode disassembler and graph view☆67Updated last year
- Stack String Explorer is a ghidra plugin to find and report stack strings (and other constant strings). Identified strings are commented …☆16Updated 10 months ago
- Binary Ninja plugin to provide LLM assistance analyzing binaries.☆22Updated 3 weeks ago
- A tool for firmware cartography☆154Updated 2 weeks ago
- ☆49Updated 2 months ago
- Flash-BASH is a Raspberry Pi based tool that uses a multiplexer to "glitch" a target device into a privileged open state.☆27Updated 3 years ago
- nRF52840 emulator to run and test custom radio protocols☆40Updated 2 years ago
- Python Command-Line Ghidra Decompiler☆104Updated 6 months ago
- ☆24Updated 3 years ago
- A step towards automating the creation of Ghidra processor modules☆37Updated 2 months ago
- A product that allows synchronizing symbols across multiple JEB/JADX instances; Allows teams to collaborate on Android decompilation proj…☆12Updated 10 months ago
- A Ghidra extension for reverse-engineering macOS binaries.☆19Updated 5 months ago
- This tool bruteforces the file offset and base load address for a raw binary program file☆15Updated last month
- A collection of my Ghidra scripts☆97Updated last year
- A tool that bypasses PN553 signature protection☆50Updated last year
- Supporting code and apps for demonstrating Android interprocess communication☆41Updated 10 months ago
- PoC associated to the talk "Attacking Samsung Galaxy A* Boot Chain" (https://www.blackhat.com/us-24/briefings/schedule/#attacking-samsung…☆68Updated 9 months ago