seemoo-lab / nexmon_debuggerLinks
Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips
☆57Updated 7 years ago
Alternatives and similar repositories for nexmon_debugger
Users that are interested in nexmon_debugger are comparing it to the libraries listed below
Sorting:
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55Updated 9 years ago
- Tools for analyzing hexagon code☆38Updated 9 years ago
- Writeups for the RHME2 CTF☆13Updated 8 years ago
- Pixel bootlaoder exploit for reading flash storage☆31Updated 8 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- SIGSTOPing ELF binaries since 0x7E1☆54Updated 10 months ago
- IDA Pro loader module for Infineon/Intel-based iPhone baseband firmwares☆25Updated 13 years ago
- USB MTP device stack and utilities☆8Updated 8 years ago
- BADFET☆44Updated 7 years ago
- The ultimate tool to crafting your ARM shell code☆10Updated 9 years ago
- CVE-2015-2231 POC☆10Updated 9 years ago
- Tools for viewing and extracting HDD firmware files☆73Updated 10 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 5 years ago
- Here be dragons. Or Slides. Or Papers. Or Nothing :)☆32Updated 6 years ago
- XED based Disassembly Engine☆19Updated 7 years ago
- Python-based interactive assembler/disassembler CLI, powered by Keystone/Capstone.☆31Updated 8 years ago
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆22Updated 7 years ago
- Standalone C version of the MSM8974 TrustZone exploit☆27Updated 4 years ago
- Tools and scripts for firmware reverse engeneering☆48Updated 4 years ago
- Debugger for the Shannon Baseband☆58Updated 5 years ago
- Misc PoCs for various research topics☆21Updated 2 years ago
- Vulnerability Reports by Aleph Research☆36Updated last year
- CVE-2014-4322 Exploit☆24Updated 9 years ago
- Memory inspection REPL interface☆46Updated 7 years ago
- repository with additional materials and source code☆31Updated 8 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- hidusb.sys source code, Windows 10 hidusb.sys fully reversed☆34Updated 8 years ago
- ☆19Updated 8 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆35Updated 6 years ago
- Modifications in the qseecom driver which enable FuzzZone to operate☆23Updated 2 years ago