kxynos / embedded_hackingLinks
Collection of scripts and how-to for hacking embedded devices
☆22Updated last month
Alternatives and similar repositories for embedded_hacking
Users that are interested in embedded_hacking are comparing it to the libraries listed below
Sorting:
- USB device fuzzing on Android Phone☆34Updated 4 years ago
- nanoMIPS module for Ghidra☆54Updated 2 months ago
- ☆33Updated last month
- MediaTek BP firmware tools☆67Updated 2 months ago
- Piotr - IoT firmware emulation instrumentation for training and research☆65Updated 3 years ago
- ☆31Updated 3 months ago
- BlueRepli-Plus☆18Updated 5 years ago
- Research tools developed for Intel Wi-Fi chips☆56Updated 7 months ago
- Hexagon processor module for IDA Pro disassembler☆19Updated 3 years ago
- Some tee/trustzone helper stuff☆56Updated 6 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- A tool that bypasses PN553 signature protection☆50Updated 2 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 3 years ago
- ☆12Updated last month
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆52Updated 7 years ago
- Finds the base address of a firmware by comparing string addresses with target pointer addresses☆54Updated 10 months ago
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆36Updated last year
- Hydradancer firmware supporting the Facedancer backend for the Hydradancer dongle and HydraUSB3☆23Updated last month
- ☆17Updated 7 years ago
- ☆23Updated 8 years ago
- ☆21Updated 2 years ago
- Fuzzing framework to target native components of android applications☆20Updated 3 years ago
- dump Exynos 8890 bootROM from Samsung Galaxy S7☆42Updated 5 years ago
- ☆11Updated last year
- Tools for exploiting, reverse engineering, and deploying firmware to the S3FWRN5 and S3NRN82 Samsung NFC Controllers☆100Updated 5 years ago
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Updated last year
- ☆31Updated 3 years ago
- ☆38Updated last year
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Updated 5 years ago
- Diaphora Machine Learning tools and datasets☆23Updated last year