redballoonsecurity / bal
A framework for parsing binary data.
☆17Updated 2 years ago
Alternatives and similar repositories for bal:
Users that are interested in bal are comparing it to the libraries listed below
- A vizualization tool for data generated by the bal framework☆11Updated 2 years ago
- Additional material for our paper "Breaking all the Things - A Systematic Survey of Firmware Extraction Techniques for IoT Devices" (CARD…☆16Updated 5 years ago
- Mimojas Firmware Toolkit for unpacking and analysis firmware images☆13Updated 4 years ago
- ☆20Updated 3 years ago
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w…☆9Updated last year
- Fuzz Network Traffic☆18Updated 4 months ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Updated 5 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- Decryption utility for PGP Whole Disk Encryption☆19Updated 3 years ago
- LoRaWAN session cracker - A PoC for exploiting weak or shared Application Keys☆16Updated 2 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆24Updated 7 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- ☆26Updated 3 months ago
- The Multiplatform Linux Sandbox☆15Updated last year
- vyos based isolation of networks☆10Updated 4 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- nü-map: a somewhat-more-modern (expeirmental) derivative of umap2 for modern FaceDancer☆25Updated last year
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆13Updated 4 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- ☆17Updated 6 years ago
- ☆32Updated 5 years ago
- Collection of RISC-V exploits☆29Updated 5 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- Research tools developed for Intel Wi-Fi chips☆52Updated last year
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago