☆18Aug 5, 2020Updated 5 years ago
Alternatives and similar repositories for jackbnimble
Users that are interested in jackbnimble are comparing it to the libraries listed below
Sorting:
- ☆13Apr 8, 2019Updated 6 years ago
- BlueRepli-Plus☆18Jul 17, 2020Updated 5 years ago
- Read only mirror - No pull requests☆20May 7, 2021Updated 4 years ago
- FirmWire has replaced ShannonEE. OLD: A dynamic analysis environment for Samsung's Shannon baseband.☆43Mar 14, 2022Updated 3 years ago
- Python GUI for seeing what's happening inside a fuzzer☆26Oct 1, 2021Updated 4 years ago
- ☆23Nov 2, 2021Updated 4 years ago
- Demo showing Claude Opus does not find CVE-2023-0266☆17Mar 19, 2024Updated last year
- ☆15Aug 3, 2023Updated 2 years ago
- Papers related with kernel papers☆13Mar 18, 2023Updated 2 years ago
- ☆15Sep 14, 2022Updated 3 years ago
- ☆15Aug 16, 2021Updated 4 years ago
- ☆16Sep 16, 2021Updated 4 years ago
- ☆33Jan 14, 2026Updated last month
- ☆20Jun 13, 2022Updated 3 years ago
- Vulnerability analyze☆17Sep 21, 2020Updated 5 years ago
- Offensive cybersecurity toolkit for vulnerability analysis and penetration testing of OBD-II devices.☆29Sep 23, 2025Updated 5 months ago
- Flounder is an old corpus collector I wrote, but it still works. Just need a Bing API key☆17Oct 25, 2019Updated 6 years ago
- A collection of resources and information about CVE-2023-2033☆19Aug 13, 2023Updated 2 years ago
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆22Aug 10, 2023Updated 2 years ago
- everyone can fuzz h2☆24Mar 13, 2019Updated 6 years ago
- Source code of SEmu-Fuzz☆22Nov 30, 2024Updated last year
- lxfuzz is a grey-box kernel fuzzer used for linux. it is scalable because of qemu being used to emulate in a way to be able to freely cho…☆22Jul 21, 2024Updated last year
- Control Flow Guard Teleportation demo☆23Jul 28, 2019Updated 6 years ago
- Firmware reverse-engineering tools for i.MX NAND flash☆54Nov 19, 2024Updated last year
- Security issues I've reported in Edge☆47Oct 19, 2022Updated 3 years ago
- Code for my blog post on using S2E for malware analysis☆25Jul 16, 2019Updated 6 years ago
- A Coverage-Based fuzzing tools☆23Aug 9, 2021Updated 4 years ago
- ☆19Apr 7, 2023Updated 2 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Jul 31, 2021Updated 4 years ago
- ☆24Dec 11, 2022Updated 3 years ago
- ☆25Sep 30, 2022Updated 3 years ago
- Toshiba MeP-c4 for Ghidra☆22May 29, 2019Updated 6 years ago
- This is the project of LearnAFL.☆28Aug 27, 2020Updated 5 years ago
- Automotive Security Toolkit☆24Feb 11, 2026Updated 3 weeks ago
- First level taint implementation with qemu for linux user mode☆28Aug 11, 2020Updated 5 years ago
- Recover mutation graph from an AFL seed☆60Jan 6, 2021Updated 5 years ago
- ☆26May 10, 2021Updated 4 years ago
- Shared Library to intercept nvram get/set/match calls for emulating libnvram.so used by many IoT firmware software.☆69Aug 10, 2021Updated 4 years ago
- ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …☆343May 27, 2024Updated last year