kxynos / embedded_hackingLinks
Collection of scripts and how-to for hacking embedded devices
☆22Updated last month
Alternatives and similar repositories for embedded_hacking
Users that are interested in embedded_hacking are comparing it to the libraries listed below
Sorting:
- nanoMIPS module for Ghidra☆54Updated 2 months ago
- USB device fuzzing on Android Phone☆34Updated 4 years ago
- MediaTek BP firmware tools☆67Updated 3 weeks ago
- ☆33Updated 2 months ago
- A tool that bypasses PN553 signature protection☆50Updated 2 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆65Updated 3 years ago
- Research tools developed for Intel Wi-Fi chips☆56Updated 7 months ago
- Hexagon processor module for IDA Pro disassembler☆19Updated 3 years ago
- ☆31Updated 3 months ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Updated 5 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆52Updated 7 years ago
- ☆21Updated 2 years ago
- Some tee/trustzone helper stuff☆56Updated 6 years ago
- ☆60Updated 2 years ago
- A MBR Fuzzer☆31Updated last year
- Towards Universal Fuzzing of IoT Protocols.☆101Updated 6 months ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 7 years ago
- LLFuzz: An Over-the-Air Dynamic Testing Framework for Cellular Baseband Lower Layers☆50Updated 5 months ago
- Tools for exploiting, reverse engineering, and deploying firmware to the S3FWRN5 and S3NRN82 Samsung NFC Controllers☆100Updated 5 years ago
- ☆17Updated 7 years ago
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆37Updated last year
- Hydradancer firmware supporting the Facedancer backend for the Hydradancer dongle and HydraUSB3☆23Updated last month
- ☆52Updated last year
- ☆23Updated 8 years ago
- Finds the base address of a firmware by comparing string addresses with target pointer addresses☆54Updated 10 months ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 3 years ago
- Universal BLE Monitoring with Frida (or Objection)☆108Updated 2 years ago
- Fuzzing All Native Android System Services with Interface Awareness and Coverage☆34Updated 4 months ago
- BlueRepli-Plus☆18Updated 5 years ago
- Wireshark dissector for Broadcom specific H4 diagnostic commands☆25Updated 3 years ago