Dynamic security analysis of embedded systems’ firmwares
☆83Oct 18, 2016Updated 9 years ago
Alternatives and similar repositories for avatar-python
Users that are interested in avatar-python are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Samples of Avatar firmware analysis (including NDSS'14 cases)☆20Jun 27, 2017Updated 8 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- Python core of avatar²☆572Mar 31, 2025Updated last year
- Tools for viewing and extracting HDD firmware files☆79Oct 1, 2014Updated 11 years ago
- Public repository of the dynamic binary analysis framework WEASEL. WEASEL's main purpose is the identification and elimination of backdoo…☆15Nov 10, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- KLEE-TAINT - Klee with taint analysis support☆71Oct 23, 2017Updated 8 years ago
- Visually Monitor Heap Allocations and Frees☆18Feb 24, 2020Updated 6 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 12 years ago
- Barely working LLVM mode for AFL on OSX☆20Dec 22, 2016Updated 9 years ago
- Collection of pin tools☆52Dec 29, 2015Updated 10 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 10 years ago
- IDAPython script in order to auto-rename subs☆20May 17, 2017Updated 9 years ago
- IDA Pro Plugins☆19May 31, 2015Updated 10 years ago
- Tool for inspecting Windows Phone applications☆28Jun 7, 2013Updated 12 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Release Branches for MoFlow☆305Nov 10, 2015Updated 10 years ago
- lojax_uefi_rootkit_checker☆19Nov 18, 2018Updated 7 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- ELF header abuse☆50Mar 23, 2016Updated 10 years ago
- 5 cves of ntp 4.2.8p15 founded by me.☆12Apr 11, 2023Updated 3 years ago
- PathArmor context-sensitive CFI implementation☆46Oct 26, 2015Updated 10 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- This is the archived S2E 1.0 repo. We do not maintain it anymore.☆314Jun 25, 2020Updated 5 years ago
- Linux hooking engine for ARM architecture☆16May 4, 2015Updated 11 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- IDA Pro loader module for Infineon/Intel-based iPhone baseband firmwares☆25Apr 19, 2012Updated 14 years ago
- ☆67Sep 3, 2020Updated 5 years ago
- Configuration security audit framework☆21Apr 27, 2016Updated 10 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆96Feb 27, 2018Updated 8 years ago
- ☆60Feb 8, 2016Updated 10 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- A research tool to identify the version of shared library files.☆22Mar 14, 2017Updated 9 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Feb 25, 2017Updated 9 years ago
- QEMU with rVMI extensions☆25Jul 25, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Some VxWorks fuzzing examples using Cisco-Kitty and WDBDbg framework☆19Mar 13, 2016Updated 10 years ago
- IDASimulator is a plugin that extends IDA's conditional breakpoint support, making it easy to augment / replace complex executable code i…☆46Sep 2, 2014Updated 11 years ago
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13May 4, 2010Updated 16 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆163May 13, 2026Updated last week
- Short for Good Ware; it assists Reverse Engineers in the analysis of Windows Malware.☆24Jun 19, 2012Updated 13 years ago
- winAFL patch to enable network-based apps fuzzing☆37Sep 14, 2018Updated 7 years ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38May 10, 2018Updated 8 years ago