quarkslab / pyrrhaLinks
A tool for firmware cartography
☆165Updated last month
Alternatives and similar repositories for pyrrha
Users that are interested in pyrrha are comparing it to the libraries listed below
Sorting:
- Ghidra scripts for recovering string definitions in Go binaries☆127Updated 2 months ago
- ☆330Updated last year
- Binarly Vulnerability Research Advisories☆185Updated this week
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- Binary Type Inference Ghidra Plugin☆168Updated last year
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆283Updated this week
- CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is a "mirror" -- p…☆135Updated 2 weeks ago
- ☆133Updated last week
- weggli ruleset scanner for source code and binaries☆37Updated 2 months ago
- ☆188Updated 2 years ago
- ☆120Updated 2 years ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆69Updated last year
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆51Updated last year
- ☆84Updated last year
- PASTIS: Collaborative Fuzzing Framework☆166Updated 3 months ago
- ☆70Updated 11 months ago
- Same-Architecture Firmware Rehosting and Fuzzing☆129Updated last year
- Reverse engineering software using a full system simulator☆191Updated last week
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆126Updated 2 months ago
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆127Updated 7 months ago
- Finds the base address of a firmware by comparing string addresses with target pointer addresses☆54Updated 10 months ago
- Leveraging patch diffing to discover new vulnerabilities☆138Updated last year
- Slides, recordings and materials of my public presentations, talks and workshops.☆81Updated 2 months ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆71Updated last year
- ☆68Updated 6 months ago
- Research tools developed for Intel Wi-Fi chips☆56Updated 7 months ago
- Xyntia, the black-box deobfuscator☆86Updated last month
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- Ariadne: Binary Ninja Graph Analysis Plugin☆104Updated 11 months ago
- ASLR bypass without infoleak☆166Updated 4 years ago