attify / firmware-analysis-toolkitLinks
Toolkit to emulate firmware and analyse it for security vulnerabilities
☆1,517Updated last year
Alternatives and similar repositories for firmware-analysis-toolkit
Users that are interested in firmware-analysis-toolkit are comparing it to the libraries listed below
Sorting:
- Platform for emulation and dynamic analysis of Linux-based firmware☆2,011Updated last year
- Script for searching the extracted firmware file system for goodies!☆1,177Updated 2 years ago
- Firmware Analysis and Comparison Tool☆1,392Updated this week
- Attify OS - Distro for pentesting IoT devices☆1,011Updated 4 years ago
- EMUX Firmware Emulation Framework (formerly ARMX)☆790Updated 3 months ago
- Automatically exported from code.google.com/p/firmware-mod-kit☆938Updated 4 months ago
- The Damn Vulnerable Router Firmware Project☆700Updated 4 years ago
- Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis☆801Updated 5 months ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,143Updated 2 years ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆2,063Updated 9 months ago
- ☆549Updated 2 years ago
- Build a database of libc offsets to simplify exploitation☆1,840Updated last year
- cwe_checker finds vulnerable patterns in binary executables☆1,291Updated 7 months ago
- The best tool for finding one gadget RCE in libc.so.6☆2,254Updated 3 weeks ago
- A fork and successor of the Sulley Fuzzing Framework☆2,266Updated last week
- the Network Protocol Fuzzer that we will want to use.☆784Updated last year
- rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆2,053Updated 2 months ago
- A collection of links related to VMware escape exploits☆1,478Updated last year
- ☆1,076Updated last year
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆477Updated 5 years ago
- A Coverage Explorer for Reverse Engineers☆2,455Updated last year
- Provide powerful tools for seccomp analysis☆1,083Updated last week
- For Linux binary Exploitation☆837Updated 7 years ago
- A fork of AFL for fuzzing Windows binaries☆2,498Updated last week
- A set of Linux binary exploitation tasks for beginners on various architectures☆543Updated 3 years ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆439Updated last month
- ☆620Updated 2 years ago
- gdb for pwn☆958Updated 3 months ago
- Scripts for the Ghidra software reverse engineering suite.☆1,119Updated 5 years ago
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,817Updated 6 years ago