quarkslab / pyrrhaLinks
A tool for firmware cartography
☆165Updated 2 months ago
Alternatives and similar repositories for pyrrha
Users that are interested in pyrrha are comparing it to the libraries listed below
Sorting:
- ☆330Updated last year
- Ghidra scripts for recovering string definitions in Go binaries☆127Updated 2 months ago
- CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is a "mirror" -- p…☆135Updated 3 weeks ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆284Updated last week
- Binarly Vulnerability Research Advisories☆185Updated 2 weeks ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- ☆133Updated 2 weeks ago
- ☆187Updated 2 years ago
- Binary Type Inference Ghidra Plugin☆168Updated 2 years ago
- ☆84Updated last year
- ☆120Updated 2 years ago
- ☆70Updated 11 months ago
- PASTIS: Collaborative Fuzzing Framework☆166Updated 3 months ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆126Updated 2 months ago
- ☆69Updated 6 months ago
- Reverse engineering software using a full system simulator☆191Updated 2 weeks ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆69Updated last year
- weggli ruleset scanner for source code and binaries☆37Updated 2 months ago
- Same-Architecture Firmware Rehosting and Fuzzing☆129Updated last year
- Python Command-Line Ghidra Decompiler☆123Updated last month
- Finds the base address of a firmware by comparing string addresses with target pointer addresses☆54Updated 11 months ago
- Leveraging patch diffing to discover new vulnerabilities☆139Updated last year
- A collection of my weggli patterns to facilitate vulnerability research.☆154Updated 3 weeks ago
- Code Coverage Exploration Plugin for Ghidra☆374Updated last year
- Ariadne: Binary Ninja Graph Analysis Plugin☆104Updated 11 months ago
- ASLR bypass without infoleak☆167Updated 4 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆71Updated last year
- Slides, recordings and materials of my public presentations, talks and workshops.☆81Updated 2 months ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- Vulnerability research assistant that extracts pseudocode from the IDA Hex-Rays decompiler.☆100Updated this week