mncoppola / ws30Links
Collection of random files and tools I wrote to assist in reverse engineering and hacking the Withings WS-30 bathroom scale.
☆71Updated 10 years ago
Alternatives and similar repositories for ws30
Users that are interested in ws30 are comparing it to the libraries listed below
Sorting:
- A PCode Emulator for Ghidra.☆110Updated 4 years ago
- Nampa - FLIRT for (binary) ninjas☆98Updated 10 months ago
- Debugger for the Shannon Baseband☆58Updated 5 years ago
- Hashashin: A Fuzzy Matching Tool for Binary Ninja☆94Updated 2 years ago
- A firmware base address search tool.☆46Updated last year
- Docker image for building ghidra RE framework from source☆76Updated 2 years ago
- ☆51Updated last year
- A Ghidra plugin for locating object file boundaries.☆126Updated last month
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆163Updated 4 years ago
- FirmWire has replaced ShannonEE. OLD: A dynamic analysis environment for Samsung's Shannon baseband.☆43Updated 3 years ago
- ☆115Updated last year
- QEMU enhanced with OS handlers, external plugins, and rapid analysis execution engine.☆41Updated 5 years ago
- A code skeleton of Samsung's Shannon S5000 baseband modem.☆47Updated 5 years ago
- Helper plugin for analyzing UEFI firmware☆90Updated last year
- ☆220Updated 2 years ago
- Adds symbols to a ELF file.☆64Updated 10 years ago
- a few Ghidra scripts for dumping PCode data☆50Updated 6 years ago
- Some glue facilitating remote use of IDA (the Interactive DisAssembler) Python API.☆77Updated 5 years ago
- ☆188Updated 7 months ago
- Headless Scripts for Ghidra's Headless Analyzer written in Python☆32Updated 6 years ago
- Standalone Utility for FACT-like extraction☆87Updated last week
- Binaryninja AVR architecture plugin with lifting☆45Updated 2 years ago
- realtime cross-tool collaborative reverse engineering☆102Updated 2 years ago
- A Minimalist Instruction Extender for the ARM architecture and IDA Pro☆201Updated last year
- ML-based ISA detection (architecture and endianness of binary code/sequences)☆66Updated 2 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆184Updated 4 years ago
- Ghidra Emulates Functions☆55Updated 5 years ago
- Finds the base address of a firmware by comparing string addresses with target pointer addresses☆53Updated 8 months ago
- Generates `.pyi` type stubs for the entire Ghidra API☆151Updated 9 months ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86) adapted to afl++☆45Updated 3 years ago