firmadyne / kernel-v2.6
Instrumented MIPS kernel
☆12Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for kernel-v2.6
- Ghidra consonance and make it more ida-ish☆15Updated 5 years ago
- Binary matching with Binary Ninja☆21Updated 4 months ago
- Collection of scripts for radare2☆28Updated 5 years ago
- Notes on QEMU and Debian MIPS (big-endian)☆43Updated 6 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆28Updated 5 years ago
- GDB command for reattaching to the new instance of the process (help exploit development)☆12Updated 8 years ago
- r2 the Rhme3! The RHme (Riscure Hack me) is a low level hardware CTF that comes in the form of an Arduino board (AVR architecture). It in…☆15Updated 7 years ago
- Splits a single TCP port for a use with multiple services (in the spirit of sslh)☆35Updated 7 years ago
- Binary Ninja plugin for ROP gadget calculation☆28Updated 5 years ago
- This repository is for binaries that are currently being worked on to be solved by angr.☆11Updated 7 years ago
- A medley of PoCs and exploits☆1Updated 5 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 5 years ago
- Plugins and signatures☆14Updated 5 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆129Updated 6 years ago
- Turns virtual usbredir connections into physical ones☆11Updated 4 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 10 years ago
- ☆29Updated 2 weeks ago
- Misc PoCs for various research topics☆21Updated 2 years ago
- Ghidra plugin to start an r2 webserver to let r2 interact with it☆44Updated 3 years ago
- Heap analysis tooling for dlmalloc☆26Updated 2 years ago
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Updated 9 years ago
- ☆32Updated 4 months ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆54Updated 6 years ago
- ☆16Updated last week
- Tracks runtime instruction execution in Linux programs☆33Updated 11 years ago
- collection of evil code☆14Updated 11 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago
- Memory inspection REPL interface☆46Updated 7 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 5 years ago