scriptingxss / firmwalkerLinks
Script for searching the extracted firmware file system for goodies!
☆29Updated 6 years ago
Alternatives and similar repositories for firmwalker
Users that are interested in firmwalker are comparing it to the libraries listed below
Sorting:
- ☆113Updated last year
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- A tool for firmware cartography☆159Updated 4 months ago
- ☆95Updated 3 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆269Updated 2 weeks ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- A full-featured open-source Wi-Fi fuzzer☆195Updated last week
- Scapy hands-on☆34Updated last year
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆119Updated last year
- ☆79Updated last year
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆69Updated 4 years ago
- Research tools developed for Intel Wi-Fi chips☆56Updated 3 months ago
- An automated setup for compiling & fuzzing Apache httpd server☆50Updated 2 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆13Updated 5 years ago
- Files used for reproducing Fuzzware's experiments☆60Updated 2 years ago
- Pwn2Win 2020 Challenges☆55Updated 4 years ago
- The Dumb Network Fuzzer☆20Updated 2 years ago
- FitM, the Fuzzer in the Middle, can fuzz client and server binaries at the same time using userspace snapshot-fuzzing and network emulati…☆291Updated 3 years ago
- USB testing made easy☆115Updated 2 years ago
- Quarkslab conference talks☆305Updated 2 weeks ago
- ☆13Updated 2 weeks ago
- Repository that tracks public exploits, vulnerabilities and advisories that I [co-]discovered or [co-]authored.☆112Updated 2 years ago
- HN Security's advisories.☆21Updated last week
- HTTP Desync Attack☆28Updated 5 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- Embedded AppSec Best Practices☆42Updated 2 years ago
- ☆128Updated last year
- Content related to hardware hacking☆53Updated 6 years ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆92Updated 3 years ago