lucyoa / embedded-toolsLinks
☆33Updated 6 years ago
Alternatives and similar repositories for embedded-tools
Users that are interested in embedded-tools are comparing it to the libraries listed below
Sorting:
- Prebuilt statically linked gdbserver and gawk executables for Linux on ARMEL, MIPS/MIPSEL and more platforms for use on embedded devices,…☆52Updated 8 years ago
- Shared Library to intercept nvram get/set/match calls for emulating libnvram.so used by many IoT firmware software.☆65Updated 4 years ago
- ☆295Updated 3 years ago
- A simple shell script and two bash sourceable scripts used to build a static gdb-7.12 gdbserver using cross-compiler setups☆87Updated 8 years ago
- A de-socketing tool that is 10x faster than desock (Preeny) in fuzzing network protocols☆90Updated 3 years ago
- prebuilt binaries for multiple architeture☆187Updated 2 years ago
- ☆102Updated 3 years ago
- ☆151Updated 10 years ago
- awesome iot exploit resource☆60Updated last year
- L2Fuzz Source Code☆40Updated last year
- Resources About Fuzzing, For Multiple Platforms And All Popular Fuzzers. 500+ Open Source Tools Sorted By Star Count, 800+ Blog Posts Sor…☆241Updated 5 years ago
- Something about CTF and vulnerability environment, mainly about kernel exploit.☆46Updated 2 years ago
- ☆15Updated 4 years ago
- Recent security papers on firmware analysis☆76Updated 3 years ago
- ☆224Updated 4 years ago
- Script to setup pwn environment for CTF with Docker☆155Updated 3 years ago
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆413Updated 3 years ago
- Some Vulnerability in the some protocol are collected.☆103Updated last year
- Automated IoT firmware fuzzing framework.☆80Updated 5 years ago
- a blackbox network fuzzer for IoT devices☆54Updated 11 months ago
- NVRAM emulator☆91Updated last year
- A Framework for fuzzing USB Drivers by Device Emulation☆124Updated 4 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆123Updated 8 years ago
- ☆66Updated 10 months ago
- Material and examples for a presentation on static binary analysis.☆45Updated 4 years ago
- One command to boot the QEMU system☆37Updated 2 years ago
- ☆32Updated 3 years ago
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆138Updated last year
- Automatic Exploit Generation Paper☆90Updated 3 years ago
- BlueFuzz is a Bluetooth fuzz tester. The scanner is general purpose, while the pseudo-random data generator is customized for OBDII - Blu…☆62Updated 8 years ago