armijnhemel / bat-extratoolsLinks
Extra tools for support in the Binary Analysis Tool. Mostly lifted from SDKs, and/or adapted from existing tools. (LEGACY)
☆18Updated 8 years ago
Alternatives and similar repositories for bat-extratools
Users that are interested in bat-extratools are comparing it to the libraries listed below
Sorting:
- Binary Analysis Tool (LEGACY)☆79Updated 3 years ago
- X41 Smartcard Fuzzer☆120Updated 6 years ago
- SIGSTOPing ELF binaries since 0x7E1☆57Updated last year
- Our backup exploitation technique: fuzzing for POVs!☆24Updated 9 years ago
- Arm Episodes☆78Updated 7 years ago
- Platform Firmware Auditing Tool☆131Updated 7 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆57Updated 8 years ago
- PIN tool runtracer suite☆44Updated 10 years ago
- The Cisco IOS Debugger and Integrated Disassembler Environment☆79Updated 7 years ago
- Tools for reverse engineering the Utimaco Firmware☆44Updated 8 years ago
- lte security☆42Updated 10 years ago
- Memory inspection REPL interface☆45Updated 8 years ago
- ☆27Updated 10 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- Binary and Directory tree comparison tool using Fuzzy Hashing☆84Updated 10 years ago
- Network and USB protocol fuzzing toolkit.☆69Updated 7 years ago
- Network and USB protocol fuzzing toolkit.☆34Updated 8 years ago
- Cisco MIPS debugger☆61Updated 7 years ago
- Black Hat 2016 Slides, Paper and Code☆82Updated 9 years ago
- The Zulu fuzzer☆124Updated 8 years ago
- a 802.11 wireless fuzzer☆93Updated 12 years ago
- Kernel and filesystem extractor☆60Updated 3 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- Tools for viewing and extracting HDD firmware files☆77Updated 11 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- RTSP network protocol fuzzer☆65Updated 11 years ago
- ☆23Updated 4 years ago
- ☆26Updated 3 weeks ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Betraying the BIOS: Where the Guardians of the BIOS are Failing☆59Updated 8 years ago