kxynos / embedded_hacking
Collection of scripts and how-to for hacking embedded devices
☆21Updated last month
Alternatives and similar repositories for embedded_hacking:
Users that are interested in embedded_hacking are comparing it to the libraries listed below
- USB device fuzzing on Android Phone☆31Updated 3 years ago
- Hydradancer firmware supporting the Facedancer backend for the Hydradancer dongle and HydraUSB3☆18Updated 3 weeks ago
- nanoMIPS module for Ghidra☆45Updated 4 months ago
- ☆30Updated 4 months ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆13Updated 4 years ago
- BlueRepli-Plus☆16Updated 4 years ago
- Arlo file format helper☆12Updated last year
- MediaTek BP firmware tools☆52Updated 9 months ago
- ☆21Updated last year
- ☆27Updated last year
- ☆30Updated 3 years ago
- Hexagon processor module for IDA Pro disassembler☆17Updated 2 years ago
- Finds the base address of a firmware by comparing string addresses with target pointer addresses☆44Updated 2 weeks ago
- ☆16Updated 6 years ago
- Some tee/trustzone helper stuff☆51Updated 5 years ago
- HN Security's advisories.☆21Updated 4 months ago
- A tool that bypasses PN553 signature protection☆49Updated last year
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Updated 3 months ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 6 years ago
- Tool developed to fuzz the GATT layer of the Bluetooth Low Energy protocol based on defined attack scenarios.☆33Updated 4 months ago
- Flash-BASH is a Raspberry Pi based tool that uses a multiplexer to "glitch" a target device into a privileged open state.☆25Updated 3 years ago
- IDA Pro script to find interesting syscalls and patterns in binaries☆17Updated 5 months ago
- ☆22Updated 7 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago
- ☆19Updated 2 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 5 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year