redballoonsecurity / balLinks
A framework for parsing binary data.
☆18Updated 3 years ago
Alternatives and similar repositories for bal
Users that are interested in bal are comparing it to the libraries listed below
Sorting:
- CITL's static analysis engine for native code artifacts☆20Updated 4 years ago
- Content related to hardware hacking☆54Updated 6 years ago
- Research tools developed for Intel Wi-Fi chips☆56Updated 6 months ago
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- Mimojas Firmware Toolkit for unpacking and analysis firmware images☆14Updated 5 years ago
- Ledger Donjon CTF 2020☆17Updated 4 years ago
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.☆13Updated 4 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Updated 5 years ago
- Conferences, tools, papers, etc.☆45Updated last month
- ☆30Updated 2 months ago
- A LoRaWAN Security Evaluation Framework☆42Updated last year
- Piotr - IoT firmware emulation instrumentation for training and research☆65Updated 3 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- Network Traffic Fuzzer☆17Updated 11 months ago
- Complete SMS packet manipulation☆113Updated 4 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated 2 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- The Dumb Network Fuzzer☆20Updated 2 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- LoRaWAN session cracker - A PoC for exploiting weak or shared Application Keys☆18Updated 3 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Updated 5 years ago
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆49Updated 4 years ago
- ☆31Updated 4 years ago
- A tool for firmware cartography☆161Updated last week
- ☆52Updated 5 months ago
- iTLB multihit PoC☆42Updated 2 years ago
- Mayhem example templates for programming languages and fuzzers that you love!☆36Updated last month
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- A (Miasm2 + binaryninja) based function divination.☆15Updated 8 years ago