quarkslab / pyrrhaLinks
A tool for firmware cartography
☆158Updated 3 months ago
Alternatives and similar repositories for pyrrha
Users that are interested in pyrrha are comparing it to the libraries listed below
Sorting:
- Ghidra scripts for recovering string definitions in Go binaries☆118Updated 10 months ago
- ☆326Updated last year
- ☆65Updated 6 months ago
- weggli ruleset scanner for source code and binaries☆30Updated 3 months ago
- CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is a "mirror" -- p…☆132Updated 2 weeks ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated last year
- Binarly Vulnerability Research Advisories☆180Updated last month
- ☆182Updated last year
- Binary Type Inference Ghidra Plugin☆165Updated last year
- Damn Vulenerable Kernel Module for kernel fuzzing☆63Updated 10 months ago
- Finds the base address of a firmware by comparing string addresses with target pointer addresses☆51Updated 6 months ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆266Updated 9 months ago
- PASTIS: Collaborative Fuzzing Framework☆162Updated last week
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆113Updated 2 months ago
- ☆131Updated 4 months ago
- ☆53Updated last month
- Slides, recordings and materials of my public presentations, talks and workshops.☆78Updated 3 months ago
- Python Command-Line Ghidra Decompiler☆109Updated last month
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆49Updated 10 months ago
- A collection of my weggli patterns to facilitate vulnerability research.☆144Updated 3 months ago
- Leveraging patch diffing to discover new vulnerabilities☆130Updated 10 months ago
- ☆74Updated 9 months ago
- ASLR bypass without infoleak☆160Updated 3 years ago
- Same-Architecture Firmware Rehosting and Fuzzing☆126Updated 8 months ago
- A Ghidra extension for scripting with GraalVM languages, including Javascript, Python3, R, and Ruby.☆61Updated 4 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆69Updated last year
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- ☆90Updated 2 years ago
- Ariadne: Binary Ninja Graph Analysis Plugin☆96Updated 6 months ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆116Updated last year