otsmr / blackbox-fuzzingLinks
Fuzzing IoT Devices Using the Router TL-WR902AC as Example
☆125Updated last month
Alternatives and similar repositories for blackbox-fuzzing
Users that are interested in blackbox-fuzzing are comparing it to the libraries listed below
Sorting:
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆54Updated 2 years ago
- ☆110Updated last year
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆63Updated 2 years ago
- ☆130Updated last year
- ASLR bypass without infoleak☆166Updated 4 years ago
- Reverse Engineering and Observability toolkit for Draytek firewalls☆48Updated 10 months ago
- Linux & Android Kernel Vulnerability research and exploitation☆57Updated 2 years ago
- ☆133Updated 3 months ago
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆87Updated 2 months ago
- MCP for Pwn☆186Updated last month
- ☆70Updated 2 years ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆66Updated last year
- ☆120Updated 2 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆130Updated 3 years ago
- Kernel Read Write Execute☆46Updated last year
- Leveraging patch diffing to discover new vulnerabilities☆137Updated last year
- ☆98Updated 4 years ago
- Same-Architecture Firmware Rehosting and Fuzzing☆127Updated last year
- A tool for firmware cartography☆162Updated last month
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- An automatic Blind ROP exploitation tool☆205Updated 2 years ago
- ☆128Updated 4 months ago
- Blogpost about optimizing binary-only fuzzing with AFL++☆71Updated 2 years ago
- Find command injection and format string bugs in binaries☆17Updated last year
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆106Updated 11 months ago
- Collection of browser challenges☆138Updated 4 years ago
- Linux Kernel N-day Exploit/Analysis.☆67Updated last year
- ☆58Updated last year
- ☆80Updated last year
- my advisory, poc, slides and scripts related to IoT/protocol security☆67Updated 4 months ago