praetorian-inc / DVRF
The Damn Vulnerable Router Firmware Project
☆673Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for DVRF
- ☆595Updated last year
- A colleciton of CTF write-ups all using pwntools☆505Updated 8 years ago
- Script for searching the extracted firmware file system for goodies!☆1,057Updated last year
- Detect, analyze and uniquely identify crashes in Windows applications☆501Updated 4 months ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆635Updated last month
- Linux Heap Exploitation Practice☆377Updated 5 years ago
- Simplify format string exploitation.☆339Updated 3 years ago
- For Linux binary Exploitation☆818Updated 6 years ago
- EMUX Firmware Emulation Framework (formerly ARMX)☆692Updated last week
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆471Updated 4 years ago
- A simple library to intercept calls to libnvram when running embedded linux applications in emulated environments.☆232Updated last year
- The 'exploitable' GDB plugin☆676Updated 2 years ago
- Payload development framework☆565Updated last month
- Smashing The Browser: From Vulnerability Discovery To Exploit☆446Updated 9 years ago
- Attify OS - Distro for pentesting IoT devices☆953Updated 3 years ago
- Peach is a fuzzing framework which uses a DSL for building fuzzers and an observer based architecture to execute and monitor them.☆402Updated 4 years ago
- the Network Protocol Fuzzer that we will want to use.☆731Updated 9 months ago
- Using Intel's PIN tool to solve CTF problems☆491Updated 4 years ago
- A TCP/UDP based network daemon fuzzer☆504Updated 5 months ago
- Fuzzing framework written in python☆426Updated 3 months ago
- Toolkit to emulate firmware and analyse it for security vulnerabilities☆1,346Updated 2 months ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,115Updated last year
- generate and search pattern string for exploit development☆199Updated last year
- My proof-of-concept exploits for the Linux kernel☆1,450Updated 2 years ago
- ☆610Updated last month
- Docker container with tools for binary reverse engineering and exploitation.☆326Updated 3 years ago
- CTF write-ups by Plaid Parliament of Pwning☆774Updated 5 months ago
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆739Updated 2 years ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆356Updated 5 years ago