☆27Jul 31, 2021Updated 4 years ago
Alternatives and similar repositories for Laelaps
Users that are interested in Laelaps are comparing it to the libraries listed below
Sorting:
- ☆71Oct 25, 2024Updated last year
- ☆164Oct 6, 2021Updated 4 years ago
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆141Oct 14, 2023Updated 2 years ago
- Avatar² examples showcased in "Avatar²: A Multi-target Orchestration Platform"☆18Feb 7, 2018Updated 8 years ago
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆64Oct 14, 2023Updated 2 years ago
- ☆14Dec 10, 2021Updated 4 years ago
- A Universal MCU Firmware Emulator for Dynamic Analysis without Any Hardware Dependence.☆145Nov 20, 2023Updated 2 years ago
- Examples demonstrating the usage of avatar²☆28Dec 9, 2023Updated 2 years ago
- ☆11Jul 4, 2023Updated 2 years ago
- SVP library that enables communication with energy lab equipment.☆13Sep 18, 2025Updated 5 months ago
- Emulating SAMSUNG HM641JI HDD firmware using Unicorn☆11Sep 19, 2022Updated 3 years ago
- fuzzing + concolic = fuzzolic :)☆127Nov 6, 2025Updated 3 months ago
- Physical Devices-Agnostic Hybrid Fuzzing of IoT Firmware☆12Mar 6, 2024Updated last year
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆86Mar 22, 2024Updated last year
- Recent security papers on firmware analysis☆78Aug 30, 2021Updated 4 years ago
- A tool to enable fuzzing for Spectre vulnerabilities☆31Feb 20, 2020Updated 6 years ago
- ☆32Aug 10, 2020Updated 5 years ago
- ☆187Nov 29, 2023Updated 2 years ago
- μSBS: Static Binary Sanitization of Bare-metal Embedded Devices☆33Jul 14, 2022Updated 3 years ago
- ☆15Aug 16, 2021Updated 4 years ago
- ☆189Mar 21, 2025Updated 11 months ago
- SymFusion: Hybrid Instrumentation for Concolic Execution☆18May 5, 2023Updated 2 years ago
- QEmu backend for avatar²☆22Mar 29, 2025Updated 11 months ago
- ☆21Sep 25, 2023Updated 2 years ago
- Peripheral Transplantation to Rehost Embedded Linux kernels☆16Mar 6, 2022Updated 3 years ago
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Dec 21, 2018Updated 7 years ago
- ☆18Dec 16, 2024Updated last year
- ☆18Dec 13, 2022Updated 3 years ago
- Code from MSc thesis on combining learning and fuzzing☆19Jul 30, 2018Updated 7 years ago
- ☆27Dec 29, 2024Updated last year
- ☆19Jul 21, 2020Updated 5 years ago
- WiiBin is a framework to determine architecture of an unknown binary and locate opcode sections within the same binary via supervised mac…☆20Dec 16, 2025Updated 2 months ago
- The published code repo for the Cortex-M SoK paper.☆27Feb 5, 2026Updated 3 weeks ago
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆422Sep 18, 2021Updated 4 years ago
- Repository for monolithic firmware blobs☆89Mar 10, 2022Updated 3 years ago
- makecfg is a tool for making CFG(Control Flow Graph) from binary.☆18Jan 11, 2022Updated 4 years ago
- ☆50Dec 17, 2020Updated 5 years ago
- ☆19Apr 7, 2023Updated 2 years ago
- Adaptive Callsite-sensitive Control Flow Integrity - EuroS&P'19☆22Dec 12, 2022Updated 3 years ago