redballoonsecurity / balLinks
A framework for parsing binary data.
☆18Updated 3 years ago
Alternatives and similar repositories for bal
Users that are interested in bal are comparing it to the libraries listed below
Sorting:
- Mimojas Firmware Toolkit for unpacking and analysis firmware images☆14Updated 5 years ago
- A LoRaWAN Security Evaluation Framework☆42Updated last year
- Research tools developed for Intel Wi-Fi chips☆56Updated 6 months ago
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆49Updated 4 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- CITL's static analysis engine for native code artifacts☆20Updated 4 years ago
- Network Traffic Fuzzer☆17Updated last year
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆65Updated 3 years ago
- Ledger Donjon CTF 2020☆17Updated 4 years ago
- Carving tool based in Radare2 & Yara☆17Updated 7 years ago
- Complete SMS packet manipulation☆114Updated 4 years ago
- ☆26Updated 2 years ago
- ☆34Updated 6 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Updated 5 years ago
- Decryption utility for PGP Whole Disk Encryption☆20Updated 4 years ago
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.☆13Updated 4 years ago
- DFF (Digital Forensics Framework)☆11Updated 5 years ago
- nü-map: a somewhat-more-modern (expeirmental) derivative of umap2 for modern FaceDancer☆29Updated 2 years ago
- Exercises for (legacy) Computer Security course in the University of Oulu☆46Updated 2 years ago
- ☆21Updated 4 years ago
- Content related to hardware hacking☆54Updated 6 years ago
- Lab Mouse Security research pertaining to RISC-V☆11Updated 8 years ago
- 5 cves of ntp 4.2.8p15 founded by me.☆12Updated 2 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Updated 5 years ago
- Minimal Indicator Storage System☆11Updated 4 years ago
- ☆30Updated 3 months ago
- A (Miasm2 + binaryninja) based function divination.☆15Updated 8 years ago
- Clone network interface from one host as a tap interface on another host☆61Updated 5 years ago
- Zigator: A security analysis tool for Zigbee and Thread networks☆33Updated 2 years ago