gckrol / draytoolsLinks
DrayTek Vigor password recovery, config & firmware tools - NOT MAINTAINED, CHECK
☆70Updated 8 years ago
Alternatives and similar repositories for draytools
Users that are interested in draytools are comparing it to the libraries listed below
Sorting:
- Set of scripts to deal with Cisco ASA firmware [pack/unpack etc.]☆103Updated 3 years ago
- Shared Library to intercept nvram get/set/match calls for emulating libnvram.so used by many IoT firmware software.☆67Updated 4 years ago
- my advisory, poc, slides and scripts related to IoT/protocol security☆67Updated 2 months ago
- ☆44Updated 4 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- RTSPhuzz - An RTSP Fuzzer written using the Boofuzz framework☆49Updated 2 years ago
- ☆33Updated this week
- Cisco IOS Exploit Framework☆22Updated 5 years ago
- NVRAM emulator☆93Updated last year
- ☆61Updated 10 months ago
- ☆54Updated 7 years ago
- Research related☆89Updated 3 years ago
- Zyxel password decrypter☆42Updated 3 years ago
- VxWorks Fuzzer with AFL and QEMU☆48Updated 5 years ago
- Cisco MIPS debugger☆60Updated 7 years ago
- ☆17Updated 7 years ago
- A Mobicore Trustlet/Driver Binary Loader for Ghidra☆13Updated 6 years ago
- A tool to locate the base address of arm32-little-end firmware binary. ##ARM固件加载基址定位☆35Updated 5 years ago
- Some Proof-of-Concepts of bugs I found☆44Updated 6 years ago
- ☆65Updated 3 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆126Updated 2 years ago
- Prebuilt statically linked gdbserver and gawk executables for Linux on ARMEL, MIPS/MIPSEL and more platforms for use on embedded devices,…☆52Updated 8 years ago
- Qemu Fuzzer.针对Qemu模拟设备的模糊测试工具,主要思路是Host生成种子Data,然后传递给Guest中转程序,由中转程序访问MMIO,以达到和模拟设备的交互,不同于qtest自带的fuzzer.☆46Updated 3 years ago
- Kernel and filesystem extractor☆60Updated 3 years ago
- poc for cve-2020-0022☆67Updated 5 years ago
- D-Link firmware decryption PoC☆189Updated last year
- Some Vulnerability in the some protocol are collected.☆105Updated last year
- ☆44Updated 8 years ago
- ☆106Updated 5 years ago
- ☆72Updated 7 years ago