redballoonsecurity / balLinks
A framework for parsing binary data.
☆17Updated 2 years ago
Alternatives and similar repositories for bal
Users that are interested in bal are comparing it to the libraries listed below
Sorting:
- A vizualization tool for data generated by the bal framework☆11Updated 2 years ago
- Additional material for our paper "Breaking all the Things - A Systematic Survey of Firmware Extraction Techniques for IoT Devices" (CARD…☆16Updated 5 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Updated 5 years ago
- ☆20Updated 3 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- Hardware Accelerated Cold-Boot Attacks☆12Updated 7 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆25Updated 7 years ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- A MBR Fuzzer☆29Updated last year
- Mimojas Firmware Toolkit for unpacking and analysis firmware images☆14Updated 5 years ago
- Research tools developed for Intel Wi-Fi chips☆54Updated last week
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆12Updated 2 years ago
- Decryption utility for PGP Whole Disk Encryption☆19Updated 3 years ago
- Training scenarios for cyber ranges☆11Updated 5 years ago
- LoRaWAN session cracker - A PoC for exploiting weak or shared Application Keys☆17Updated 3 years ago
- DC540 hacking challenge 0x00005b.☆17Updated last year
- ☆32Updated 5 years ago
- ☆17Updated 6 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆13Updated 4 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 5 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- vyos based isolation of networks☆10Updated 4 years ago
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆33Updated 6 months ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- Hash collisions and their exploitations☆9Updated 3 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago