cloakware-ctf / rhme3-writeupsLinks
Writeups for the RHME3 Challenges
☆52Updated 6 years ago
Alternatives and similar repositories for rhme3-writeups
Users that are interested in rhme3-writeups are comparing it to the libraries listed below
Sorting:
- Nordic Semiconductor nRF5x series disassembly tools☆74Updated 7 years ago
- Some tools for testing USB devices☆132Updated 12 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆162Updated 4 years ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆82Updated last year
- ☆187Updated 3 months ago
- Helpful scripts for various tasks performed during reverse engineering the Shannon Baseband with the goal to exploit the Samsung Galaxy S…☆249Updated 5 years ago
- Riscure Hack Me embedded hardware CTF 2017-2018.☆88Updated 7 years ago
- ☆56Updated 7 years ago
- A curated list of awesome baseband research resources☆167Updated 5 years ago
- RHme+ 2015 challenge☆111Updated 9 years ago
- A firmware base address search tool.☆353Updated 4 years ago
- A PCode Emulator for Ghidra.☆109Updated 4 years ago
- RHme3 CTF writeups☆20Updated 2 years ago
- FirmWire has replaced ShannonEE. OLD: A dynamic analysis environment for Samsung's Shannon baseband.☆42Updated 3 years ago
- GDB plugin peda for arm☆146Updated last month
- CSAW Embedded Security Challenge 2019☆34Updated 5 years ago
- Qt Side Channel Analysis Tool to handle signal traces and more☆32Updated 3 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆152Updated 5 years ago
- Nailgun attack on ARM devices.☆165Updated 4 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆199Updated 4 years ago
- Automatic Vulnerability Discovery☆38Updated 6 years ago
- Source code of HAL-fuzz☆152Updated 4 years ago
- Tasteless CTF 2019☆20Updated 5 years ago
- ☆114Updated last year
- Debugger for the Shannon Baseband☆58Updated 5 years ago
- ☆58Updated 4 years ago
- ☆219Updated 2 years ago
- ☆162Updated 3 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆122Updated 8 years ago
- IDA Pro to Ghidra Key Bindings to feel like if you were in IDA Pro when navigating☆89Updated 6 years ago