Samples of Avatar firmware analysis (including NDSS'14 cases)
☆20Jun 27, 2017Updated 8 years ago
Alternatives and similar repositories for avatar-samples
Users that are interested in avatar-samples are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dynamic security analysis of embedded systems’ firmwares☆83Oct 18, 2016Updated 9 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 12 years ago
- 5 cves of ntp 4.2.8p15 founded by me.☆12Apr 11, 2023Updated 3 years ago
- Tools for viewing and extracting HDD firmware files☆79Oct 1, 2014Updated 11 years ago
- THREADS Conference Archive☆16Aug 1, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- DLL to use the power of Pafish☆32Oct 5, 2021Updated 4 years ago
- lojax_uefi_rootkit_checker☆19Nov 18, 2018Updated 7 years ago
- Citadel 1.3.5.1☆28Jul 10, 2013Updated 12 years ago
- Some VxWorks fuzzing examples using Cisco-Kitty and WDBDbg framework☆19Mar 13, 2016Updated 10 years ago
- Extract LZMA sections from cable modem firmware images☆20Nov 18, 2013Updated 12 years ago
- ☆12Jun 14, 2023Updated 2 years ago
- IP Cam Honeypot☆20Feb 28, 2024Updated 2 years ago
- Visually Monitor Heap Allocations and Frees☆18Feb 24, 2020Updated 6 years ago
- records of my daily sec learning☆13Mar 20, 2020Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A python layer to interface with several SMTLIBv2 enabled SMT solvers☆16Apr 22, 2015Updated 10 years ago
- A log collector for Peach fuzzing in the cloud☆28Apr 2, 2014Updated 12 years ago
- ☆21Mar 24, 2015Updated 11 years ago
- Linux hooking engine for ARM architecture☆16May 4, 2015Updated 10 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Sep 11, 2014Updated 11 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- PE file parser☆38Sep 13, 2015Updated 10 years ago
- You can use ropper to display information about files in different file formats and you can find gadgets to build rop chains for differen…☆12Jun 7, 2018Updated 7 years ago
- Valgrind extension for whitebox fuzz testing☆30Jul 10, 2009Updated 16 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆27Nov 4, 2015Updated 10 years ago
- Dominator Tree LLVM Pass to Test Satisfiability☆46Mar 14, 2016Updated 10 years ago
- openioc_scan Volatility Framework plugin☆44Feb 25, 2016Updated 10 years ago
- The educational Animus malware☆18Sep 25, 2019Updated 6 years ago
- Patch for the emulation of Octeon MIPS64 in QEMU☆15Feb 2, 2018Updated 8 years ago
- ES6/Svelte-based web interface for meteocool, a rain radar with storm tracking, live lightning and satellite data.☆13Mar 1, 2026Updated last month
- git-cvs is a tool to incrementally import changesets from CVS into a Git repository with stable commit hashes.☆15Oct 29, 2015Updated 10 years ago
- ☆53Apr 22, 2015Updated 10 years ago
- Malware Analysis and Storage System - Server repository☆12Jul 15, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- bdldr is an unofficial engine loader for Bitdefender ® for Linux☆45Mar 12, 2016Updated 10 years ago
- 各种安全相关思维导图整理收集☆12Feb 13, 2017Updated 9 years ago
- ☆26Jan 18, 2026Updated 2 months ago
- A Yocto meta-layer for generating CycloneDX SBOMs☆25Mar 29, 2026Updated 2 weeks ago
- Noodle - A doodle clone in haskell☆15Nov 8, 2016Updated 9 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago