ollseg / usb-device-fuzzing
Some tools for testing USB devices
☆129Updated 12 years ago
Alternatives and similar repositories for usb-device-fuzzing:
Users that are interested in usb-device-fuzzing are comparing it to the libraries listed below
- Helpful scripts for various tasks performed during reverse engineering the Shannon Baseband with the goal to exploit the Samsung Galaxy S…☆244Updated 4 years ago
- ☆160Updated 7 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆53Updated 8 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆256Updated 3 years ago
- An automated NFC fuzzing framework for Android devices.☆139Updated 4 years ago
- a 802.11 wireless fuzzer☆91Updated 12 years ago
- Tools for analyzing hexagon code☆38Updated 8 years ago
- The USB host security assessment tool☆276Updated 6 years ago
- Writeups for the RHME3 Challenges☆52Updated 6 years ago
- Arm Episodes☆78Updated 7 years ago
- Dynamic security analysis of embedded systems’ firmwares☆80Updated 8 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆160Updated 3 years ago
- QEMU-based framework exposing several of QEMU-internal APIs to a LuaJIT core injected into QEMU itself. Among other things, this allows f…☆147Updated 6 years ago
- A linux system call fuzzer using TriforceAFL☆174Updated 11 months ago
- Huawei mate 7 TrustZone exploit☆111Updated 9 years ago
- RHme+ 2015 challenge☆109Updated 8 years ago
- A collection of more than 1000 binary libc files☆87Updated 9 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆89Updated 9 years ago
- Exploitation on ARM-based Systems (Troopers18)☆147Updated 6 years ago
- Symbolic Execution Tool in r2☆104Updated 3 years ago
- ☆64Updated 4 years ago
- AFL, with scripts to support other architectures.☆96Updated 6 years ago
- A PCode Emulator for Ghidra.☆107Updated 4 years ago
- ☆52Updated 7 years ago
- A simple library to intercept calls to libnvram when running embedded linux applications in emulated environments.☆237Updated last year
- "Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones" ACSAC 2019☆153Updated 3 years ago
- YAFFS extractor☆47Updated 5 months ago
- A code gadget finder based on capstone/keystone/pyelftools☆92Updated 7 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆245Updated 5 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆147Updated 5 years ago