prebuilt binaries for multiple architeture
☆205Mar 7, 2023Updated 3 years ago
Alternatives and similar repositories for prebuilt-multiarch-bin
Users that are interested in prebuilt-multiarch-bin are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- some ida script☆34Aug 18, 2021Updated 4 years ago
- Add debugging tools to an existing initramfs, even if it is for a foreign architecture☆24Aug 28, 2024Updated last year
- Public repository of statically compiled GDB and GDBServer☆395Sep 30, 2021Updated 4 years ago
- ☆40Feb 3, 2026Updated last month
- ☆10Mar 6, 2026Updated 2 weeks ago
- A simple tool helps CTFpwner deal with protobuf ELF, reverses proto structure and generates ".proto" files.☆20May 12, 2025Updated 10 months ago
- A tool to recover a fully analyzable .ELF from a raw kernel, through extracting the kernel symbol table (kallsyms)☆1,702Updated this week
- attachments and (some) writeups/source code for RWCTF 6th☆126Feb 2, 2024Updated 2 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆35Apr 26, 2022Updated 3 years ago
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆423Sep 18, 2021Updated 4 years ago
- SCTF 2023 kernel pwn && CVE-2023-3640☆29Jul 17, 2023Updated 2 years ago
- ☆85Oct 15, 2022Updated 3 years ago
- Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis☆842Dec 25, 2025Updated 3 months ago
- exploit for dirtycow☆14Dec 21, 2022Updated 3 years ago
- Ghidra/IDA Pro plugins to load similarity result from binaryai.net☆93Apr 11, 2023Updated 2 years ago
- awesome iot exploit resource☆72Jul 15, 2024Updated last year
- NVRAM emulator☆100May 21, 2024Updated last year
- The project black zone☆18Nov 9, 2017Updated 8 years ago
- 固件分析工具☆23Jan 7, 2025Updated last year
- SAEG: Stateful Automatic Exploit Generation, an AEG framework for CGC / RHG and pwnable CTF challenges.☆175Jan 1, 2025Updated last year
- ☆34Jun 11, 2024Updated last year
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- Same-Architecture Firmware Rehosting and Fuzzing☆130Dec 19, 2024Updated last year
- Linux kernel privilege escalation techniques☆153Aug 9, 2024Updated last year
- ☆298Jun 21, 2022Updated 3 years ago
- A /proc/mem IDA loader to snapshot a running process☆170Jun 29, 2025Updated 8 months ago
- ☆28Dec 17, 2025Updated 3 months ago
- IDA Pro plugin for query based searching within the binary useful mainly for vulnerability research.☆660May 13, 2025Updated 10 months ago
- ☆39Jun 6, 2024Updated last year
- D^3CTF 2022 d3bpf, d3bpf-v2 attachment, exp and official writeup☆12Mar 8, 2022Updated 4 years ago
- Prebuilt statically linked gdbserver and gawk executables for Linux on ARMEL, MIPS/MIPSEL and more platforms for use on embedded devices,…☆54Jun 20, 2017Updated 8 years ago
- Compiled GDB for various distributions and architectures☆42Jul 18, 2024Updated last year
- Framework for Automating Fuzzable Target Discovery with Static Analysis.☆549Feb 1, 2024Updated 2 years ago
- Peripheral Transplantation to Rehost Embedded Linux kernels☆16Mar 6, 2022Updated 4 years ago
- Port of devttyS0's IDA plugins to the Ghidra plugin framework, new plugins as well.☆495May 3, 2021Updated 4 years ago
- 2019 Advent Calendar, vmware pwnables☆50Jul 21, 2020Updated 5 years ago
- Scripts and cheatsheets for IDAPython☆688Nov 2, 2023Updated 2 years ago
- radius2 is a fast binary emulation and symbolic execution framework using radare2☆620Dec 20, 2024Updated last year
- CTF MISC 方向从入门到精通指南,个人 MISC 知识点总结☆20Sep 15, 2025Updated 6 months ago