quarkslab / pyrrhaLinks
A tool for firmware cartography
☆161Updated 5 months ago
Alternatives and similar repositories for pyrrha
Users that are interested in pyrrha are comparing it to the libraries listed below
Sorting:
- Ghidra scripts for recovering string definitions in Go binaries☆124Updated last week
- Binarly Vulnerability Research Advisories☆183Updated last month
- ☆329Updated last year
- ☆133Updated last month
- CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is a "mirror" -- p…☆135Updated last week
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆278Updated 2 weeks ago
- Binary Type Inference Ghidra Plugin☆166Updated last year
- ☆187Updated 2 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- PASTIS: Collaborative Fuzzing Framework☆162Updated last month
- Same-Architecture Firmware Rehosting and Fuzzing☆125Updated 11 months ago
- weggli ruleset scanner for source code and binaries☆35Updated 2 weeks ago
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆122Updated 5 months ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆65Updated last year
- ☆68Updated 9 months ago
- ☆108Updated 10 months ago
- ☆79Updated 11 months ago
- ☆60Updated 4 months ago
- Python Command-Line Ghidra Decompiler☆120Updated 3 months ago
- Reverse engineering software using a full system simulator☆189Updated this week
- Ariadne: Binary Ninja Graph Analysis Plugin☆102Updated 9 months ago
- Finds the base address of a firmware by comparing string addresses with target pointer addresses☆53Updated 8 months ago
- ☆96Updated 2 years ago
- Leveraging patch diffing to discover new vulnerabilities☆136Updated last year
- Quarkslab Bindiffer but not only !☆213Updated 6 months ago
- A collection of my weggli patterns to facilitate vulnerability research.☆149Updated 3 weeks ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆122Updated 2 weeks ago
- ASLR bypass without infoleak☆163Updated 4 years ago
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆50Updated last year
- Vulnerability research assistant that extracts pseudocode from the IDA Hex-Rays decompiler.☆91Updated this week