microsoft / CoDe16Links
Microsoft’s cyber physical system researchers recently identified multiple high-severity vulnerabilities in the CODESYS V3 software development kit (SDK)
☆50Updated 2 years ago
Alternatives and similar repositories for CoDe16
Users that are interested in CoDe16 are comparing it to the libraries listed below
Sorting:
- ☆112Updated last year
- Siemens SIMATIC vulnerabilities☆22Updated 3 years ago
- ☆95Updated 3 years ago
- A tool for firmware cartography☆158Updated 2 months ago
- ☆18Updated 3 years ago
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆235Updated 4 months ago
- Client utility for Siemens S7 bootloader special access feature☆75Updated 4 years ago
- ☆28Updated 2 months ago
- asnfuzzgen - ASN.1 Structure-Aware Fuzzing Compiler☆44Updated last year
- ☆326Updated last year
- Binarly Vulnerability Research Advisories☆179Updated last month
- Fuzzing Embedded Systems using Hardware Breakpoints☆187Updated last year
- ☆36Updated this week
- Firmware Analysis Tool☆170Updated 9 months ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆116Updated last year
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- Library to disassemble MC7 bytecode for Siemens PLC SIMATIC S7-300 and S7-400☆43Updated 6 months ago
- Towards Universal Fuzzing of IoT Protocols.☆99Updated last month
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆113Updated 2 months ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆262Updated 9 months ago
- Arlo file format helper☆14Updated last year
- A tool for reverse engineering industrial control systems binaries.☆169Updated last year
- Research tools developed for Intel Wi-Fi chips☆55Updated 2 months ago
- ☆131Updated 3 months ago
- Binary Type Inference Ghidra Plugin☆165Updated last year
- A set of vulnerable C code snippets (with mapped CVEs)☆79Updated last year
- BOF (Boiboite Opener Framework) is a testing framework for industrial protocols implementations and devices.☆49Updated 6 months ago
- Mayhem example templates for programming languages and fuzzers that you love!☆33Updated 2 weeks ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆239Updated last year
- Material from ICS Village talk at DEFCON 25☆12Updated 7 years ago