scriptingxss / firmwalkerLinks
Script for searching the extracted firmware file system for goodies!
☆29Updated 6 years ago
Alternatives and similar repositories for firmwalker
Users that are interested in firmwalker are comparing it to the libraries listed below
Sorting:
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆258Updated 8 months ago
- ☆95Updated 3 years ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆116Updated last year
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- A tool for firmware cartography☆157Updated last month
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- FitM, the Fuzzer in the Middle, can fuzz client and server binaries at the same time using userspace snapshot-fuzzing and network emulati…☆291Updated 3 years ago
- Quarkslab conference talks☆301Updated 2 weeks ago
- Scapy hands-on☆34Updated last year
- Files used for reproducing Fuzzware's experiments☆60Updated 2 years ago
- USB testing made easy☆115Updated 2 years ago
- Content related to hardware hacking☆53Updated 6 years ago
- Read only mirror - No pull requests☆19Updated 4 years ago
- Curated collection of resources, examples and scripts for Linux kernel devs, researchers and hobbyists.☆59Updated 2 years ago
- ☆123Updated last year
- ☆111Updated 11 months ago
- EMBArk - The firmware security scanning environment☆352Updated last week
- An automated setup for compiling & fuzzing Apache httpd server☆50Updated 2 years ago
- A full-featured open-source Wi-Fi fuzzer☆192Updated last month
- Slides & Hands-on for the reverse engineering workshop☆181Updated 2 years ago
- Research tools developed for Intel Wi-Fi chips☆55Updated last month
- Simulator forked from ICSim used during Car Hacking Workshops☆16Updated 11 months ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆424Updated 3 years ago
- Repository that tracks public exploits, vulnerabilities and advisories that I [co-]discovered or [co-]authored.☆112Updated 2 years ago
- The Dumb Network Fuzzer☆20Updated 2 years ago
- A list of lists involving IoT in general☆147Updated 3 years ago
- ☆130Updated 3 months ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆117Updated 8 months ago