mncoppola / ws30Links
Collection of random files and tools I wrote to assist in reverse engineering and hacking the Withings WS-30 bathroom scale.
☆70Updated 9 years ago
Alternatives and similar repositories for ws30
Users that are interested in ws30 are comparing it to the libraries listed below
Sorting:
- A PCode Emulator for Ghidra.☆108Updated 4 years ago
- Adds symbols to a ELF file.☆61Updated 9 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆162Updated 3 years ago
- Debugger for the Shannon Baseband☆58Updated 4 years ago
- YAFFS extractor☆51Updated 9 months ago
- Hashashin: A Fuzzy Matching Tool for Binary Ninja☆93Updated last year
- Nampa - FLIRT for (binary) ninjas☆94Updated 5 months ago
- Speculative disassembly, CFG recovery, and call-graph recovery from stripped binaries.☆107Updated 6 years ago
- A firmware base address search tool.☆45Updated last year
- FirmWire has replaced ShannonEE. OLD: A dynamic analysis environment for Samsung's Shannon baseband.☆41Updated 3 years ago
- A code skeleton of Samsung's Shannon S5000 baseband modem.☆45Updated 5 years ago
- ☆50Updated last year
- ML-based ISA detection (architecture and endianness of binary code/sequences)☆65Updated 2 years ago
- Headless Scripts for Ghidra's Headless Analyzer written in Python☆32Updated 5 years ago
- QEMU enhanced with OS handlers, external plugins, and rapid analysis execution engine.☆41Updated 4 years ago
- A C library for mutating test cases☆14Updated 5 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆74Updated 4 years ago
- Use Ghidra Structs in Python☆29Updated 4 years ago
- Script for emulating Arm firmware in QEMU, including a binary for hooking functions for certain Tenda firmware versions that are not stra…☆30Updated 5 years ago
- Boring tool to launch multiple afl-fuzz instances☆50Updated 7 years ago
- Binaryninja AVR architecture plugin with lifting☆43Updated last year
- QEMU with support for QDSP6 user mode emulation☆32Updated 5 years ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆66Updated 8 years ago
- ☆112Updated last year
- An IDA Pro Plugin for embedding an IPython Kernel☆64Updated 5 years ago
- ☆186Updated 2 months ago
- A Ghidra processor module for the EFI Byte Code (EBC)☆31Updated 4 years ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86) adapted to afl++☆44Updated 3 years ago
- Tools for analyzing hexagon code☆38Updated 8 years ago
- Emulating Exynos 4210 BootROM in QEMU☆73Updated 5 years ago