r00tb3 / awesome-baseband-research
A curated list of awesome baseband research resources
☆16Updated 5 years ago
Alternatives and similar repositories for awesome-baseband-research:
Users that are interested in awesome-baseband-research are comparing it to the libraries listed below
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆34Updated 6 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 5 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 5 years ago
- Brainfuck architecture module and loader for Binary Ninja☆15Updated 3 years ago
- PCILeech HP iLO4 Service☆23Updated 6 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Colorize Reached Blocks in IDA Pro using DynamoRIO drcov Output☆19Updated last year
- Here be dragons. Or Slides. Or Papers. Or Nothing :)☆31Updated 6 years ago
- Export a binary from ghidra to emulate with unicorn☆26Updated 5 years ago
- Format string exploit generation☆10Updated 9 years ago
- ☆13Updated 4 years ago
- ☆36Updated 5 years ago
- PoC code for CVE-2018-9539☆18Updated 6 years ago
- A debugger / emulator for Ghidra☆14Updated 5 years ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆34Updated 5 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 6 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 10 years ago
- Tools and scripts for firmware reverse engeneering☆48Updated 4 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- ☆13Updated 5 years ago
- ☆12Updated 8 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Updated 7 years ago
- The Dumb Network Fuzzer☆20Updated last year
- Simulate afl-fuzz☆16Updated 5 years ago