binarly-io / Vulnerability-REsearchLinks
Binarly Vulnerability Research Advisories
☆181Updated last week
Alternatives and similar repositories for Vulnerability-REsearch
Users that are interested in Vulnerability-REsearch are comparing it to the libraries listed below
Sorting:
- ☆133Updated last week
- A tool for firmware cartography☆160Updated 4 months ago
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆237Updated 5 months ago
- ☆94Updated last year
- Binary exploitation by confusing the unwinder☆66Updated 2 years ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆64Updated last year
- Reverse engineering software using a full system simulator☆186Updated 2 weeks ago
- CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is a "mirror" -- p…☆134Updated last month
- UEFI and SMM Assessment Tool☆204Updated 11 months ago
- Ghidra scripts for recovering string definitions in Go binaries☆120Updated 11 months ago
- ☆152Updated 5 months ago
- msFuzz is a coverage-guided fuzzer for Windows kernel drivers that utilizes Intel PT and leverages constraint and dependency analysis to …☆191Updated 5 months ago
- 👓A collection of papers/tools/exploits for UEFI security.☆195Updated last month
- PASTIS: Collaborative Fuzzing Framework☆162Updated last week
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆273Updated 3 weeks ago
- ASLR bypass without infoleak☆160Updated 3 years ago
- Static Binary Instrumentation tool for Windows x64 executables☆207Updated 3 weeks ago
- Same-Architecture Firmware Rehosting and Fuzzing☆124Updated 10 months ago
- ☆75Updated last year
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆120Updated last year
- ☆184Updated last year
- A collection of my weggli patterns to facilitate vulnerability research.☆146Updated 3 weeks ago
- ☆327Updated last year
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- Files used for reproducing Fuzzware's experiments☆60Updated 2 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆69Updated last year
- A patched QEMU that exposes an interface for LibAFL-based fuzzers☆84Updated 2 weeks ago
- Leveraging patch diffing to discover new vulnerabilities☆136Updated last year
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆241Updated last year
- ☆79Updated 10 months ago