otsmr / blackbox-fuzzingLinks
Fuzzing IoT Devices Using the Router TL-WR902AC as Example
☆115Updated last year
Alternatives and similar repositories for blackbox-fuzzing
Users that are interested in blackbox-fuzzing are comparing it to the libraries listed below
Sorting:
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆52Updated last year
- ☆101Updated 6 months ago
- Reverse Engineering and Observability toolkit for Draytek firewalls☆40Updated 5 months ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆61Updated last year
- ☆127Updated 8 months ago
- ☆130Updated 2 months ago
- ☆71Updated 2 years ago
- Kernel Read Write Execute☆45Updated 6 months ago
- ASLR bypass without infoleak☆162Updated 3 years ago
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆85Updated 7 months ago
- A tool for firmware cartography☆157Updated last month
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆103Updated 5 months ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆63Updated 9 months ago
- An automatic Blind ROP exploitation tool☆204Updated 2 years ago
- ☆80Updated 11 months ago
- ☆60Updated last year
- A full-featured open-source Wi-Fi fuzzer☆192Updated last month
- Leveraging patch diffing to discover new vulnerabilities☆127Updated 9 months ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- Linux Kernel N-day Exploit/Analysis.☆66Updated 9 months ago
- Research browsers☆40Updated 2 months ago
- ☆95Updated 3 years ago
- ☆90Updated 2 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆67Updated last year
- ☆65Updated last year
- Blogpost about optimizing binary-only fuzzing with AFL++☆66Updated last year
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- Same-Architecture Firmware Rehosting and Fuzzing☆126Updated 7 months ago
- Toolkit to turn Chromium vulnerabilities into full-chain exploits☆184Updated 2 weeks ago
- Find command injection and format string bugs in binaries☆16Updated last year