rampageX / firmware-mod-kit
Automatically exported from code.google.com/p/firmware-mod-kit
☆881Updated 7 months ago
Alternatives and similar repositories for firmware-mod-kit:
Users that are interested in firmware-mod-kit are comparing it to the libraries listed below
- ☆530Updated last year
- Collection of Python scripts for reading information about and extracting data from UBI and UBIFS images.☆570Updated 2 months ago
- Toolkit to emulate firmware and analyse it for security vulnerabilities☆1,417Updated 7 months ago
- Script for searching the extracted firmware file system for goodies!☆1,112Updated last year
- http://firmware-mod-kit.googlecode.com/svn/trunk☆304Updated 6 months ago
- Various binaries for the mips architecture.☆305Updated 7 months ago
- Platform for emulation and dynamic analysis of Linux-based firmware☆1,917Updated 8 months ago
- JFFS2 filesystem extraction tool☆334Updated last year
- EMUX Firmware Emulation Framework (formerly ARMX)☆734Updated last week
- Firmware Analysis and Comparison Tool☆1,321Updated this week
- Tool for viewing and extracting files from an UBIFS image☆252Updated 8 months ago
- Statically compiled ARM binaries for debugging and runtime analysis☆481Updated 4 years ago
- ☆228Updated 2 years ago
- Attify OS - Distro for pentesting IoT devices☆979Updated 3 years ago
- The Damn Vulnerable Router Firmware Project☆685Updated 4 years ago
- Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)☆920Updated 3 years ago
- D-Link firmware decryption PoC☆179Updated last year
- Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis☆707Updated 8 months ago
- ToolSet for VxWorks Based Embedded Device Analyses☆358Updated 6 months ago
- A firmware base address search tool.☆349Updated 4 years ago
- ☆1,345Updated last year
- A tool to recover a fully analyzable .ELF from a raw kernel, through extracting the kernel symbol table (kallsyms)☆1,465Updated this week
- Recognize cpu instructions in an arbitrary binary file☆678Updated last year
- arm_now is a qemu powered tool that allows instant setup of virtual machines on arm cpu, mips, powerpc, nios2, x86 and more, for reverse,…☆874Updated 2 years ago
- Given an Arduino compatible microcontroller or Raspberry PI (experimental), JTAGenum scans pins[] for basic JTAG functionality and can be…☆744Updated last year
- BootStomp: a bootloader vulnerability finder☆397Updated 3 years ago
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆478Updated 4 years ago
- Scripts for the Ghidra software reverse engineering suite.☆1,073Updated 4 years ago
- IDA Python Embedded Toolkit -- IDAPython scripts for automating analysis of firmware of embedded devices☆679Updated 5 years ago
- A curated list of awesome Ghidra materials☆1,241Updated 3 years ago