DrayTek Vigor password recovery, config & firmware tools - NOT MAINTAINED, CHECK
☆71Dec 7, 2016Updated 9 years ago
Alternatives and similar repositories for draytools
Users that are interested in draytools are comparing it to the libraries listed below
Sorting:
- awesome iot exploit resource☆71Jul 15, 2024Updated last year
- ☆12Feb 16, 2012Updated 14 years ago
- Presented hardware reverse engineering workshops since 2019☆62Aug 8, 2024Updated last year
- DrayTek Vigor password recovery, config & firmware tools☆11Jul 18, 2015Updated 10 years ago
- Modified luadec version to decompile TP-Link Archer C7 LUA firmware.☆31Mar 3, 2020Updated 6 years ago
- DIR-850L A1 Firmware GPL source☆12Mar 9, 2020Updated 6 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Jun 26, 2018Updated 7 years ago
- some ida script☆34Aug 18, 2021Updated 4 years ago
- 近年来容器安全相关论文收集整理☆15May 26, 2023Updated 2 years ago
- Shared Library to intercept nvram get/set/match calls for emulating libnvram.so used by many IoT firmware software.☆69Aug 10, 2021Updated 4 years ago
- A collection of POP exploits.☆30Feb 22, 2021Updated 5 years ago
- ISC2017安全大会☆16Nov 3, 2017Updated 8 years ago
- Automatic credential collection☆21Aug 17, 2022Updated 3 years ago
- ics security tools☆20May 13, 2017Updated 8 years ago
- Parser utility to generate ASTs from PHP source code suitable to be processed by Joern.☆15Jan 27, 2019Updated 7 years ago
- Accelerated execution for fast Windows fuzzing☆25Jan 9, 2025Updated last year
- repo for ACTF 2020. Challenges, WPs, sources, etc.☆14Dec 9, 2020Updated 5 years ago
- Extract credentials from lsass remotely☆16Jan 3, 2020Updated 6 years ago
- python exp of pwnable' problems☆18Feb 5, 2024Updated 2 years ago
- Some tools for CTF off line☆19Nov 19, 2017Updated 8 years ago
- Reverse Engineering and Observability toolkit for Draytek firewalls☆49Feb 28, 2025Updated last year
- MikroTik remote jailbreak for v6.x.x☆149Jul 29, 2023Updated 2 years ago
- 物联网安全开源图书☆190Apr 23, 2022Updated 3 years ago
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆50Jan 12, 2023Updated 3 years ago
- Collection of Python scripts for reading information about and extracting data from UBI and UBIFS images.☆624Feb 20, 2026Updated 2 weeks ago
- FIRM-AFL is the first high-throughput greybox fuzzer for IoT firmware.☆458Mar 22, 2024Updated last year
- ToolSet for VxWorks Based Embedded Device Analyses☆378Sep 24, 2024Updated last year
- CodeQL workshops for GitHub Universe☆96Nov 14, 2022Updated 3 years ago
- Public repository of statically compiled GDB and GDBServer☆395Sep 30, 2021Updated 4 years ago
- World's first Bitcoin client ddos software // Experimental program to exhaust inbound TCP connections of a Bitcoin node☆24Jul 24, 2019Updated 6 years ago
- ☆27Dec 12, 2018Updated 7 years ago
- qemu vulnerablity.☆55May 25, 2021Updated 4 years ago
- ☆24Nov 23, 2019Updated 6 years ago
- 《Ghidra权威指南》相关资源☆174Feb 8, 2023Updated 3 years ago
- Challenge attachments for RWCTF 3rd.☆91Jul 1, 2021Updated 4 years ago
- Code for UI, backend, engine and statistical analysis for RE☆23Aug 7, 2021Updated 4 years ago
- IoT固件漏洞挖掘工具☆248Nov 11, 2022Updated 3 years ago
- A simple library to intercept calls to libnvram when running embedded linux applications in emulated environments.☆257Oct 29, 2023Updated 2 years ago
- Python module to help in exploitation of the FILE structure in C☆27Dec 2, 2018Updated 7 years ago