hid emulation tools for the usbarmory
☆67Dec 12, 2016Updated 9 years ago
Alternatives and similar repositories for hidemulation
Users that are interested in hidemulation are comparing it to the libraries listed below
Sorting:
- ☆14Dec 9, 2015Updated 10 years ago
- Repo for the paper "USB Devices phoning home"☆22Feb 12, 2016Updated 10 years ago
- Scripts, learnings, sample configurations, and random whining☆151May 19, 2015Updated 10 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 9 years ago
- LPE exploits for Secret Net and Secret Net Studio☆52Mar 1, 2016Updated 10 years ago
- INTERLOCK - file encryption and HSM front-end☆305Feb 2, 2026Updated last month
- JEFF file format tools☆27Dec 24, 2015Updated 10 years ago
- utility for emulating a USB HID keyboard with the USBArmory☆44Mar 1, 2018Updated 8 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- A USB armory based USB sandbox☆22Jun 14, 2017Updated 8 years ago
- IDAPython plugin for finding Xrefs from a function☆48Jul 14, 2016Updated 9 years ago
- CHIPSEC module that exploits UEFI boot script table vulnerability☆134Jan 25, 2016Updated 10 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆170Jul 7, 2018Updated 7 years ago
- ☆27Jan 27, 2017Updated 9 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Crash repro minifier for ASan-instrumented commandline tools.☆12Dec 29, 2019Updated 6 years ago
- A clone (of the basic core) of AFL fuzzer☆74Feb 6, 2016Updated 10 years ago
- "Just Another ReVersIng Suite" or whatever other bullshit you can think of☆150Apr 28, 2023Updated 2 years ago
- ☆17Aug 20, 2014Updated 11 years ago
- Password manager for USB Armory☆37Sep 1, 2015Updated 10 years ago
- AFL "mostly" ported to cygwin☆26Apr 11, 2016Updated 9 years ago
- Tenshi - log monitoring tool☆51Jan 13, 2026Updated last month
- IDAPython script for quick vulnerability analysis☆32May 10, 2014Updated 11 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Jun 19, 2020Updated 5 years ago
- Identifies common functions in iBSS/iBEC/iBoot/LLB☆31Oct 26, 2015Updated 10 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 7 years ago
- Download all of Microsoft's security updates and symbols☆41Mar 31, 2016Updated 9 years ago
- XED based Disassembly Engine☆21Apr 23, 2018Updated 7 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Feb 14, 2025Updated last year
- A python layer to interface with several SMTLIBv2 enabled SMT solvers☆16Apr 22, 2015Updated 10 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆38May 29, 2018Updated 7 years ago
- ☆35Sep 18, 2015Updated 10 years ago
- Infecting PE☆25Mar 10, 2014Updated 11 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- DbgScript is a multi-script dbgeng (WinDbg, cdb, ntsd) extension. Use Python, Ruby or Lua to analyze data structures, or BYO provider.☆23Aug 15, 2016Updated 9 years ago
- covFuzz☆34Jun 8, 2017Updated 8 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆28Apr 26, 2016Updated 9 years ago
- Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS☆105Jan 25, 2021Updated 5 years ago