hid emulation tools for the usbarmory
☆68Dec 12, 2016Updated 9 years ago
Alternatives and similar repositories for hidemulation
Users that are interested in hidemulation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripts, learnings, sample configurations, and random whining☆151May 19, 2015Updated 10 years ago
- Repo for the paper "USB Devices phoning home"☆22Feb 12, 2016Updated 10 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- INTERLOCK - file encryption and HSM front-end☆305Feb 2, 2026Updated last month
- utility for emulating a USB HID keyboard with the USBArmory☆44Mar 1, 2018Updated 8 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 10 years ago
- A USB armory based USB sandbox☆22Jun 14, 2017Updated 8 years ago
- LPE exploits for Secret Net and Secret Net Studio☆52Mar 1, 2016Updated 10 years ago
- JEFF file format tools☆27Dec 24, 2015Updated 10 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Jun 19, 2020Updated 5 years ago
- IDAPython plugin for finding Xrefs from a function☆48Jul 14, 2016Updated 9 years ago
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆171Jul 7, 2018Updated 7 years ago
- Password manager for USB Armory☆37Sep 1, 2015Updated 10 years ago
- Tenshi - log monitoring tool☆51Jan 13, 2026Updated 2 months ago
- Download all of Microsoft's security updates and symbols☆41Mar 31, 2016Updated 9 years ago
- ☆18Sep 22, 2017Updated 8 years ago
- Crash repro minifier for ASan-instrumented commandline tools.☆12Dec 29, 2019Updated 6 years ago
- CHIPSEC module that exploits UEFI boot script table vulnerability☆136Jan 25, 2016Updated 10 years ago
- ☆27Jan 27, 2017Updated 9 years ago
- "Just Another ReVersIng Suite" or whatever other bullshit you can think of☆150Apr 28, 2023Updated 2 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- U3 armory - exploiting the AutoRunz☆22Feb 7, 2017Updated 9 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆49Nov 24, 2024Updated last year
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 8 years ago
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- AFL "mostly" ported to cygwin☆26Apr 11, 2016Updated 9 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- ☆17Aug 20, 2014Updated 11 years ago
- Linux hooking engine for ARM architecture☆16May 4, 2015Updated 10 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆38May 29, 2018Updated 7 years ago
- Collection of pin tools☆52Dec 29, 2015Updated 10 years ago
- A clone (of the basic core) of AFL fuzzer☆74Feb 6, 2016Updated 10 years ago
- ☆35Sep 18, 2015Updated 10 years ago
- Identifies common functions in iBSS/iBEC/iBoot/LLB☆31Oct 26, 2015Updated 10 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆28Apr 26, 2016Updated 9 years ago
- IDAPython script for quick vulnerability analysis☆32May 10, 2014Updated 11 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Repository for Security Workshop content☆20Sep 4, 2017Updated 8 years ago