knightmare2600 / draytoolsLinks
DrayTek Vigor password recovery, config & firmware tools
☆11Updated 10 years ago
Alternatives and similar repositories for draytools
Users that are interested in draytools are comparing it to the libraries listed below
Sorting:
- NVRAM emulator☆100Updated last year
- DrayTek Vigor password recovery, config & firmware tools - NOT MAINTAINED, CHECK☆70Updated 9 years ago
- my advisory, poc, slides and scripts related to IoT/protocol security☆69Updated 5 months ago
- Shared Library to intercept nvram get/set/match calls for emulating libnvram.so used by many IoT firmware software.☆69Updated 4 years ago
- One command to boot the QEMU system☆37Updated 3 years ago
- awesome iot exploit resource☆70Updated last year
- ☆92Updated 3 years ago
- ☆33Updated 6 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆130Updated 2 years ago
- RTSPhuzz - An RTSP Fuzzer written using the Boofuzz framework☆49Updated 2 years ago
- nOBEX allows emulating the PBAP, MAP, and HFP profiles to test vehicle infotainment systems and similar devices using these profiles☆94Updated 5 years ago
- BlueFuzz is a Bluetooth fuzz tester. The scanner is general purpose, while the pseudo-random data generator is customized for OBDII - Blu…☆64Updated 8 years ago
- ☆71Updated last year
- CVE-2020-0022 vulnerability exploitation on Bouygues BBox Miami (Android TV 8.0 - ARM32 Cortex A9)☆35Updated 4 years ago
- ☆67Updated 4 years ago
- D-Link firmware decryption PoC☆191Updated 2 years ago
- L2Fuzz Source Code☆44Updated 2 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆129Updated 8 years ago
- Firmware scraper☆118Updated last year
- Reverse Engineering and Observability toolkit for Draytek firewalls☆49Updated 11 months ago
- Some Vulnerability in the some protocol are collected.☆109Updated last year
- A de-socketing tool that is 10x faster than desock (Preeny) in fuzzing network protocols☆95Updated 3 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆132Updated 3 years ago
- libc database (file in packages, hash, package files, symbols). Raw binary libc available on https://github.com/BestPig/libc-bin)☆32Updated 11 months ago
- Research related☆89Updated 3 years ago
- AFLplusplus + libprotobuf-mutator☆61Updated 3 years ago
- Code snippets for Binary Ninja's Python API☆31Updated 4 years ago
- ☆19Updated 6 years ago
- Everything you need to build and run Linux and Android kernels for exploit development☆100Updated last year
- ☆217Updated 5 months ago