kxynos / embedded_hackingLinks
Collection of scripts and how-to for hacking embedded devices
☆22Updated 9 months ago
Alternatives and similar repositories for embedded_hacking
Users that are interested in embedded_hacking are comparing it to the libraries listed below
Sorting:
- USB device fuzzing on Android Phone☆34Updated 4 years ago
- nanoMIPS module for Ghidra☆53Updated 3 weeks ago
- MediaTek BP firmware tools☆63Updated 3 weeks ago
- BlueRepli-Plus☆18Updated 5 years ago
- ☆33Updated 2 weeks ago
- A tool that bypasses PN553 signature protection☆50Updated 2 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆65Updated 3 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- Hexagon processor module for IDA Pro disassembler☆19Updated 3 years ago
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆36Updated last year
- Some tee/trustzone helper stuff☆56Updated 6 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆52Updated 7 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Updated 5 years ago
- Research tools developed for Intel Wi-Fi chips☆56Updated 5 months ago
- ☆59Updated 2 years ago
- ☆31Updated last month
- ☆23Updated 8 years ago
- ☆11Updated last year
- Finds the base address of a firmware by comparing string addresses with target pointer addresses☆53Updated 8 months ago
- ☆31Updated 3 years ago
- A vehicle network analysis and attack tool.☆18Updated 2 years ago
- Tools for exploiting, reverse engineering, and deploying firmware to the S3FWRN5 and S3NRN82 Samsung NFC Controllers☆100Updated 5 years ago
- ☆21Updated 2 years ago
- ☆17Updated 7 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 3 years ago
- dump Exynos 8890 bootROM from Samsung Galaxy S7☆42Updated 5 years ago
- Some Proof-of-Concepts of bugs I found☆44Updated 6 years ago
- Android privilege escalation via an use-after-free in binder.c☆39Updated 5 years ago
- ☆36Updated 10 months ago
- ☆24Updated 2 years ago