devttys0 / sasquatchLinks
☆551Updated 2 years ago
Alternatives and similar repositories for sasquatch
Users that are interested in sasquatch are comparing it to the libraries listed below
Sorting:
- JFFS2 filesystem extraction tool☆343Updated 2 years ago
- Collection of Python scripts for reading information about and extracting data from UBI and UBIFS images.☆604Updated 2 weeks ago
- Automatically exported from code.google.com/p/firmware-mod-kit☆942Updated 5 months ago
- Statically compiled ARM binaries for debugging and runtime analysis☆517Updated 4 years ago
- Script for searching the extracted firmware file system for goodies!☆1,177Updated 2 years ago
- ☆233Updated 2 years ago
- EMUX Firmware Emulation Framework (formerly ARMX)☆792Updated 3 months ago
- http://firmware-mod-kit.googlecode.com/svn/trunk☆311Updated last year
- Toolkit to emulate firmware and analyse it for security vulnerabilities☆1,522Updated last year
- A firmware base address search tool.☆366Updated 5 years ago
- Platform for emulation and dynamic analysis of Linux-based firmware☆2,015Updated last year
- Various binaries for the mips architecture.☆329Updated last year
- A simple library to intercept calls to libnvram when running embedded linux applications in emulated environments.☆250Updated 2 years ago
- Firmware Analysis and Comparison Tool☆1,395Updated last week
- Python core of avatar²☆561Updated 8 months ago
- The Damn Vulnerable Router Firmware Project☆700Updated 4 years ago
- BootStomp: a bootloader vulnerability finder☆409Updated 3 years ago
- Tool for viewing and extracting files from an UBIFS image☆282Updated 6 months ago
- ToolSet for VxWorks Based Embedded Device Analyses☆367Updated last year
- arm_now is a qemu powered tool that allows instant setup of virtual machines on arm cpu, mips, powerpc, nios2, x86 and more, for reverse,…☆885Updated 3 years ago
- Recognize cpu instructions in an arbitrary binary file☆720Updated last year
- IDA Python Embedded Toolkit -- IDAPython scripts for automating analysis of firmware of embedded devices☆682Updated 6 years ago
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆477Updated 5 years ago
- Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)☆947Updated 3 years ago
- a tool to analyze filesystem images for security☆507Updated 2 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆272Updated 4 years ago
- Raw binary firmware analysis software☆565Updated last year
- D-Link firmware decryption PoC☆189Updated last year
- ☆1,366Updated 2 years ago
- ☆220Updated 2 years ago