attify / firmware-analysis-toolkit
Toolkit to emulate firmware and analyse it for security vulnerabilities
☆1,399Updated 4 months ago
Alternatives and similar repositories for firmware-analysis-toolkit:
Users that are interested in firmware-analysis-toolkit are comparing it to the libraries listed below
- Platform for emulation and dynamic analysis of Linux-based firmware☆1,870Updated 6 months ago
- Script for searching the extracted firmware file system for goodies!☆1,096Updated last year
- Attify OS - Distro for pentesting IoT devices☆966Updated 3 years ago
- Firmware Analysis and Comparison Tool☆1,296Updated this week
- EMUX Firmware Emulation Framework (formerly ARMX)☆713Updated last month
- The Damn Vulnerable Router Firmware Project☆678Updated 3 years ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆1,907Updated 3 months ago
- Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis☆687Updated 6 months ago
- Automatically exported from code.google.com/p/firmware-mod-kit☆868Updated 5 months ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,125Updated last year
- ☆525Updated last year
- A fork and successor of the Sulley Fuzzing Framework☆2,078Updated last week
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆475Updated 4 years ago
- cwe_checker finds vulnerable patterns in binary executables☆1,183Updated last month
- Build a database of libc offsets to simplify exploitation☆1,740Updated 3 months ago
- The best tool for finding one gadget RCE in libc.so.6☆2,123Updated this week
- ☆638Updated this week
- A collection of links related to VMware escape exploits☆1,395Updated 5 months ago
- Python core of avatar²☆541Updated 2 months ago
- rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆1,868Updated 9 months ago
- gdb for pwn☆905Updated 5 months ago
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,751Updated 5 years ago
- a tool to analyze filesystem images for security☆498Updated last year
- IDA Python Embedded Toolkit -- IDAPython scripts for automating analysis of firmware of embedded devices☆679Updated 5 years ago
- A colleciton of CTF write-ups all using pwntools☆508Updated 8 years ago
- Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)☆911Updated 2 years ago
- My proof-of-concept exploits for the Linux kernel☆1,462Updated 2 years ago
- ☆993Updated 11 months ago
- A set of Linux binary exploitation tasks for beginners on various architectures☆528Updated 3 years ago
- Provide powerful tools for seccomp analysis☆1,007Updated this week