lucyoa / embedded-tools
☆30Updated 5 years ago
Alternatives and similar repositories for embedded-tools:
Users that are interested in embedded-tools are comparing it to the libraries listed below
- Shared Library to intercept nvram get/set/match calls for emulating libnvram.so used by many IoT firmware software.☆56Updated 3 years ago
- A simple shell script and two bash sourceable scripts used to build a static gdb-7.12 gdbserver using cross-compiler setups☆81Updated 7 years ago
- Prebuilt statically linked gdbserver and gawk executables for Linux on ARMEL, MIPS/MIPSEL and more platforms for use on embedded devices,…☆49Updated 7 years ago
- USB device fuzzing on Android Phone☆31Updated 3 years ago
- some ida script☆30Updated 3 years ago
- ☆32Updated 2 years ago
- A de-socketing tool that is 10x faster than desock (Preeny) in fuzzing network protocols☆82Updated 2 years ago
- ☆26Updated 6 years ago
- ☆99Updated 3 years ago
- ☆29Updated 2 years ago
- ☆288Updated 2 years ago
- Something about CTF and vulnerability environment, mainly about kernel exploit.☆46Updated 2 years ago
- ☆88Updated 2 years ago
- awesome iot exploit resource☆47Updated 6 months ago
- NVRAM emulator☆84Updated 8 months ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆113Updated 7 years ago
- Prebuilt statically linked gdbserver and gawk executables for Linux on ARMEL, MIPS/MIPSEL and more platforms for use on embedded devices,…☆17Updated 7 years ago
- windows debug and exploit toolset for both user and kernel mode☆177Updated 4 months ago
- ☆149Updated 10 years ago
- All architecture and all version of gdbserver.☆27Updated 2 years ago
- A tool to locate the base address of arm32-little-end firmware binary. ##ARM固件加载基址定位☆34Updated 4 years ago
- Research related☆87Updated 2 years ago
- Tool developed to fuzz the GATT layer of the Bluetooth Low Energy protocol based on defined attack scenarios.☆27Updated 3 months ago
- ☆61Updated 3 months ago
- multiarch qemu system env for playing and debugging :)☆31Updated 3 years ago
- Some Vulnerability in the some protocol are collected.☆97Updated 8 months ago
- IoT Security Papers☆48Updated 5 years ago
- AFLNW: network wrapper for AFL☆47Updated 11 months ago
- prebuilt binaries for multiple architeture☆164Updated last year
- ☆20Updated 3 years ago