fotisl / utimaco
Tools for reverse engineering the Utimaco Firmware
☆43Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for utimaco
- lte security☆41Updated 9 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆43Updated 8 years ago
- XED based Disassembly Engine☆18Updated 6 years ago
- Misc PoCs for various research topics☆21Updated 2 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆142Updated 10 years ago
- Fuzzer☆43Updated 10 years ago
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Updated 9 years ago
- ☆114Updated 7 years ago
- ☆38Updated 9 years ago
- Collection of scripts for radare2☆28Updated 5 years ago
- A few ZigBee Tools to compliment KillerBee☆52Updated 8 years ago
- ☆24Updated 9 years ago
- Memory inspection REPL interface☆46Updated 7 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆38Updated 7 years ago
- Our backup exploitation technique: fuzzing for POVs!☆25Updated 8 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆50Updated 8 years ago
- ☆26Updated 8 years ago
- Network and USB protocol fuzzing toolkit.☆34Updated 7 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆28Updated 10 years ago
- Python module to detect, analyze and id application bugs☆21Updated 4 months ago
- Recon materials☆28Updated 7 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 5 years ago
- Routines for hunting down kernel structs.☆40Updated 13 years ago
- ☆32Updated 5 months ago
- ☆15Updated 4 years ago
- REbus facilitates the coupling of existing tools that perform specific tasks, where one's output will be used as the input of others.☆25Updated 4 years ago
- Proof of concept code (which means poor code quality) for a proxy abusing unrestricted cross domain policies.☆23Updated 11 years ago