b1ack0wl / DVRF
The Damn Vulnerable Router Firmware Project
☆30Updated 6 years ago
Alternatives and similar repositories for DVRF:
Users that are interested in DVRF are comparing it to the libraries listed below
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- 802.15.4 Fuzzer☆21Updated 5 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated 5 months ago
- #INFILTRATE20 raptor's party pack.☆28Updated last year
- ☆44Updated 6 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆20Updated 5 years ago
- I have taken all of the challenges from Protostar - https://exploit-exercises.com/protostar/- and compiled them for the ARM architecture.…☆23Updated 9 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆38Updated 6 years ago
- ☆20Updated 5 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 6 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆34Updated 6 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆17Updated 5 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 5 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Updated 6 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- ☆33Updated 9 years ago
- The Dumb Network Fuzzer☆19Updated last year
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 6 years ago
- For code snippets and information☆41Updated 5 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Updated 5 years ago
- ☆36Updated 5 years ago
- Flare-On solutions☆36Updated 5 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago