lucyoa / embedded-tools
☆31Updated 5 years ago
Alternatives and similar repositories for embedded-tools
Users that are interested in embedded-tools are comparing it to the libraries listed below
Sorting:
- Shared Library to intercept nvram get/set/match calls for emulating libnvram.so used by many IoT firmware software.☆61Updated 3 years ago
- A de-socketing tool that is 10x faster than desock (Preeny) in fuzzing network protocols☆84Updated 2 years ago
- Prebuilt statically linked gdbserver and gawk executables for Linux on ARMEL, MIPS/MIPSEL and more platforms for use on embedded devices,…☆49Updated 7 years ago
- A simple shell script and two bash sourceable scripts used to build a static gdb-7.12 gdbserver using cross-compiler setups☆87Updated 7 years ago
- ☆101Updated 3 years ago
- Something about CTF and vulnerability environment, mainly about kernel exploit.☆46Updated 2 years ago
- ☆32Updated 3 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆123Updated last year
- ☆89Updated 2 years ago
- ☆290Updated 2 years ago
- A tool to locate the base address of arm32-little-end firmware binary. ##ARM固件加载基址定位☆34Updated 5 years ago
- ☆29Updated 2 years ago
- ☆66Updated 3 years ago
- ☆11Updated 8 months ago
- ☆26Updated 6 years ago
- The best vulnerable driver to learn how to exploit kernel vulnerability.☆29Updated 5 years ago
- prebuilt binaries for multiple architeture☆174Updated 2 years ago
- All architecture and all version of gdbserver.☆27Updated 2 years ago
- ☆65Updated 6 months ago
- some ida script☆32Updated 3 years ago
- ☆52Updated 6 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆121Updated 7 years ago
- Recent security papers on firmware analysis☆76Updated 3 years ago
- NVRAM emulator☆88Updated 11 months ago
- ☆14Updated 3 years ago
- gdb plugin for linux kernel to debug slub☆52Updated 5 years ago
- Build a database of libc offsets to simplify exploitation☆20Updated 9 years ago
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆136Updated last year
- AFLNW: network wrapper for AFL☆47Updated last year
- Automatic Exploit Generation Paper☆86Updated 3 years ago