attify / firmware-analysis-toolkitLinks
Toolkit to emulate firmware and analyse it for security vulnerabilities
☆1,501Updated last year
Alternatives and similar repositories for firmware-analysis-toolkit
Users that are interested in firmware-analysis-toolkit are comparing it to the libraries listed below
Sorting:
- Script for searching the extracted firmware file system for goodies!☆1,166Updated 2 years ago
- Platform for emulation and dynamic analysis of Linux-based firmware☆1,981Updated last year
- Attify OS - Distro for pentesting IoT devices☆1,006Updated 4 years ago
- Firmware Analysis and Comparison Tool☆1,377Updated last week
- EMUX Firmware Emulation Framework (formerly ARMX)☆761Updated last month
- Automatically exported from code.google.com/p/firmware-mod-kit☆930Updated 2 months ago
- The Damn Vulnerable Router Firmware Project☆695Updated 4 years ago
- Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis☆777Updated 3 months ago
- ☆543Updated 2 years ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆2,035Updated 7 months ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,140Updated 2 years ago
- A fork and successor of the Sulley Fuzzing Framework☆2,229Updated 3 weeks ago
- A collection of links related to VMware escape exploits☆1,462Updated last year
- the Network Protocol Fuzzer that we will want to use.☆776Updated last year
- cwe_checker finds vulnerable patterns in binary executables☆1,266Updated 5 months ago
- Build a database of libc offsets to simplify exploitation☆1,821Updated 11 months ago
- rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆2,012Updated 2 weeks ago
- The best tool for finding one gadget RCE in libc.so.6☆2,234Updated this week
- My proof-of-concept exploits for the Linux kernel☆1,513Updated 3 weeks ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆803Updated 3 years ago
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆477Updated 5 years ago
- ☆615Updated 2 years ago
- Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)☆946Updated 3 years ago
- Exercises to learn how to fuzz with American Fuzzy Lop☆1,261Updated 2 years ago
- Provide powerful tools for seccomp analysis☆1,068Updated this week
- A set of Linux binary exploitation tasks for beginners on various architectures☆541Updated 3 years ago
- Various kernel exploits☆795Updated last year
- A fork of AFL for fuzzing Windows binaries☆2,473Updated last month
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆842Updated 5 years ago
- ☆715Updated 2 weeks ago