prebuilt binaries for multiple architeture
☆202Mar 7, 2023Updated 2 years ago
Alternatives and similar repositories for prebuilt-multiarch-bin
Users that are interested in prebuilt-multiarch-bin are comparing it to the libraries listed below
Sorting:
- ☆40Feb 3, 2026Updated last month
- Public repository of statically compiled GDB and GDBServer☆395Sep 30, 2021Updated 4 years ago
- some ida script☆34Aug 18, 2021Updated 4 years ago
- Add debugging tools to an existing initramfs, even if it is for a foreign architecture☆24Aug 28, 2024Updated last year
- attachments and (some) writeups/source code for RWCTF 6th☆125Feb 2, 2024Updated 2 years ago
- A simple tool helps CTFpwner deal with protobuf ELF, reverses proto structure and generates ".proto" files.☆19May 12, 2025Updated 9 months ago
- Peripheral Transplantation to Rehost Embedded Linux kernels☆16Mar 6, 2022Updated 3 years ago
- A tool to recover a fully analyzable .ELF from a raw kernel, through extracting the kernel symbol table (kallsyms)☆1,692Updated this week
- Ghidra/IDA Pro plugins to load similarity result from binaryai.net☆93Apr 11, 2023Updated 2 years ago
- NVRAM emulator☆100May 21, 2024Updated last year
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆423Sep 18, 2021Updated 4 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆35Apr 26, 2022Updated 3 years ago
- ☆34Jun 11, 2024Updated last year
- ☆10Sep 1, 2021Updated 4 years ago
- SCTF 2023 kernel pwn && CVE-2023-3640☆29Jul 17, 2023Updated 2 years ago
- Python bindings for BochsCPU☆38Aug 10, 2025Updated 6 months ago
- Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis☆835Dec 25, 2025Updated 2 months ago
- SAEG: Stateful Automatic Exploit Generation, an AEG framework for CGC / RHG and pwnable CTF challenges.☆176Jan 1, 2025Updated last year
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- awesome iot exploit resource☆71Jul 15, 2024Updated last year
- ☆298Jun 21, 2022Updated 3 years ago
- IDA Pro plugin for query based searching within the binary useful mainly for vulnerability research.☆658May 13, 2025Updated 9 months ago
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆339Dec 12, 2024Updated last year
- Simple script to find kernel objects of a certain size in the Linux kernel☆112Dec 1, 2022Updated 3 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆91May 12, 2022Updated 3 years ago
- 2019 Advent Calendar, vmware pwnables☆50Jul 21, 2020Updated 5 years ago
- A /proc/mem IDA loader to snapshot a running process☆169Jun 29, 2025Updated 8 months ago
- Framework for Automating Fuzzable Target Discovery with Static Analysis.☆548Feb 1, 2024Updated 2 years ago
- Port of devttyS0's IDA plugins to the Ghidra plugin framework, new plugins as well.☆496May 3, 2021Updated 4 years ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆106Jan 13, 2026Updated last month
- radius2 is a fast binary emulation and symbolic execution framework using radare2☆621Dec 20, 2024Updated last year
- Prebuilt statically linked gdbserver and gawk executables for Linux on ARMEL, MIPS/MIPSEL and more platforms for use on embedded devices,…☆54Jun 20, 2017Updated 8 years ago
- Same-Architecture Firmware Rehosting and Fuzzing☆130Dec 19, 2024Updated last year
- Linux kernel privilege escalation techniques☆152Aug 9, 2024Updated last year
- Script to setup pwn environment with Docker☆47Jan 10, 2026Updated last month
- ☆85Oct 15, 2022Updated 3 years ago
- FIRM-AFL is the first high-throughput greybox fuzzer for IoT firmware.☆457Mar 22, 2024Updated last year
- IoT固件漏洞挖掘工具☆248Nov 11, 2022Updated 3 years ago
- Shared Library to intercept nvram get/set/match calls for emulating libnvram.so used by many IoT firmware software.☆69Aug 10, 2021Updated 4 years ago