☆23Jun 29, 2017Updated 8 years ago
Alternatives and similar repositories for sboot-binwalk
Users that are interested in sboot-binwalk are comparing it to the libraries listed below
Sorting:
- legacy MTK devices preLoader from Mediatek☆20Apr 29, 2024Updated last year
- An IDA file loader for Mobicore trustlet and driver binaries☆60Jan 21, 2020Updated 6 years ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- IDA plugin that displays the P-code for the current function☆72Nov 18, 2025Updated 4 months ago
- Replace gdb default history searcher and auto complete with fzf fuzzy finder☆25Apr 14, 2023Updated 2 years ago
- ☆11Sep 12, 2021Updated 4 years ago
- ☆16Jul 20, 2017Updated 8 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆158Dec 16, 2019Updated 6 years ago
- LiteX-based PCIe MITM, sniffing, fuzzing, device emulation☆19Feb 9, 2022Updated 4 years ago
- Patch to enable KGDBOC via Serial over USB. And debug Samsung Android Kernels.☆24Jun 29, 2019Updated 6 years ago
- Custom instruction length for hex-rays☆28Jan 17, 2026Updated 2 months ago
- CVE-2014-4322 Exploit☆24Jan 24, 2016Updated 10 years ago
- ☆17Oct 5, 2020Updated 5 years ago
- IDA (sort of) headless☆27Feb 17, 2024Updated 2 years ago
- temporary root for the Galaxy S7 Active☆21Nov 28, 2016Updated 9 years ago
- ☆32Aug 10, 2020Updated 5 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆41Jan 2, 2018Updated 8 years ago
- Ghidra Emulates Functions☆57Oct 13, 2020Updated 5 years ago
- Files and writeups for challenges I authored in BalsnCTF 2022.☆26Sep 5, 2022Updated 3 years ago
- linux kernel LPE using hw_breakpoint attack tech demo☆26Mar 24, 2023Updated 2 years ago
- ☆13Dec 7, 2023Updated 2 years ago
- Ghidra is a software reverse engineering (SRE) framework☆11Jan 2, 2025Updated last year
- TWRP device tree for ZTE Axon 7 (ailsa_ii)☆12Mar 7, 2022Updated 4 years ago
- Debug IDAPython in VSCode☆27Mar 20, 2023Updated 3 years ago
- Farm root is a root for android devices using the dirty cow vulnerability☆23Oct 29, 2016Updated 9 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- Documents and whitepapers☆12Aug 9, 2016Updated 9 years ago
- Collection of scripts for reversing Qualcomm Hexagon baseband / modem firmware☆13Jun 21, 2023Updated 2 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Stack String Explorer is a ghidra plugin to find and report stack strings (and other constant strings). Identified strings are commented …☆22Aug 20, 2024Updated last year
- Data Recovery Research☆13Dec 19, 2025Updated 3 months ago
- ☆43Updated this week
- Hex-Rays Block Highlighter plugin for IDA to highlight if/for/do/switch/while blocks☆62Apr 17, 2022Updated 3 years ago
- Some tee/trustzone helper stuff☆55Sep 29, 2019Updated 6 years ago
- A debugger / emulator for Ghidra☆14Oct 30, 2019Updated 6 years ago
- Dronity, the Trinity syscall fuzzer ported to Android☆43Oct 10, 2015Updated 10 years ago
- A simple test of fuzzing Java with AFL and GCJ☆16Jan 31, 2018Updated 8 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆34Oct 18, 2023Updated 2 years ago
- Samsung's CodeSigner☆13Sep 28, 2020Updated 5 years ago