Dynamic security analysis of embedded systems’ firmwares
☆83Oct 18, 2016Updated 9 years ago
Alternatives and similar repositories for avatar-python
Users that are interested in avatar-python are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Samples of Avatar firmware analysis (including NDSS'14 cases)☆20Jun 27, 2017Updated 8 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- Python core of avatar²☆569Mar 31, 2025Updated 11 months ago
- Tools for viewing and extracting HDD firmware files☆79Oct 1, 2014Updated 11 years ago
- Public repository of the dynamic binary analysis framework WEASEL. WEASEL's main purpose is the identification and elimination of backdoo…☆15Nov 10, 2020Updated 5 years ago
- KLEE-TAINT - Klee with taint analysis support☆71Oct 23, 2017Updated 8 years ago
- Visually Monitor Heap Allocations and Frees☆18Feb 24, 2020Updated 6 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- Barely working LLVM mode for AFL on OSX☆20Dec 22, 2016Updated 9 years ago
- Collection of pin tools☆52Dec 29, 2015Updated 10 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 10 years ago
- IDAPython script in order to auto-rename subs☆20May 17, 2017Updated 8 years ago
- IDA Pro Plugins☆19May 31, 2015Updated 10 years ago
- Tool for inspecting Windows Phone applications☆28Jun 7, 2013Updated 12 years ago
- Release Branches for MoFlow☆307Nov 10, 2015Updated 10 years ago
- lojax_uefi_rootkit_checker☆19Nov 18, 2018Updated 7 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- ELF header abuse☆50Mar 23, 2016Updated 10 years ago
- 5 cves of ntp 4.2.8p15 founded by me.☆12Apr 11, 2023Updated 2 years ago
- PathArmor context-sensitive CFI implementation☆46Oct 26, 2015Updated 10 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- This is the archived S2E 1.0 repo. We do not maintain it anymore.☆315Jun 25, 2020Updated 5 years ago
- Linux hooking engine for ARM architecture☆16May 4, 2015Updated 10 years ago
- IDA Pro loader module for Infineon/Intel-based iPhone baseband firmwares☆25Apr 19, 2012Updated 13 years ago
- ☆67Sep 3, 2020Updated 5 years ago
- Configuration security audit framework☆21Apr 27, 2016Updated 9 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Feb 27, 2018Updated 8 years ago
- ☆60Feb 8, 2016Updated 10 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- A research tool to identify the version of shared library files.☆22Mar 14, 2017Updated 9 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Feb 25, 2017Updated 9 years ago
- QEMU with rVMI extensions☆25Jul 25, 2017Updated 8 years ago
- Some VxWorks fuzzing examples using Cisco-Kitty and WDBDbg framework☆19Mar 13, 2016Updated 10 years ago
- IDASimulator is a plugin that extends IDA's conditional breakpoint support, making it easy to augment / replace complex executable code i…☆46Sep 2, 2014Updated 11 years ago
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13May 4, 2010Updated 15 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆163Updated this week
- Short for Good Ware; it assists Reverse Engineers in the analysis of Windows Malware.☆24Jun 19, 2012Updated 13 years ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38May 10, 2018Updated 7 years ago
- winAFL patch to enable network-based apps fuzzing☆37Sep 14, 2018Updated 7 years ago