seemoo-lab / polypyus
☆216Updated last year
Alternatives and similar repositories for polypyus:
Users that are interested in polypyus are comparing it to the libraries listed below
- A firmware base address search tool.☆347Updated 4 years ago
- Ghidra Function ID dataset repository☆180Updated 4 years ago
- Frida-based general purpose fuzzer☆212Updated 4 years ago
- ☆186Updated 3 years ago
- Raw binary firmware analysis software☆511Updated 7 months ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆181Updated 3 years ago
- ☆131Updated 3 years ago
- Binary code coverage visualizer plugin for Ghidra☆288Updated 6 months ago
- IDA plugins and scripts for analyzing register usage frame☆179Updated last year
- A curated list of awesome baseband research resources☆161Updated 4 years ago
- Broadcom and Cypress firmware emulation for fuzzing and further full-stack debugging☆441Updated 11 months ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆157Updated 3 years ago
- A PCode Emulator for Ghidra.☆106Updated 3 years ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆205Updated 3 years ago
- Ghidra Extension to integrate BinDiff for function matching☆262Updated 3 months ago
- Port of devttyS0's IDA plugins to the Ghidra plugin framework, new plugins as well.☆473Updated 3 years ago
- ☆105Updated 5 years ago
- ☆116Updated 2 weeks ago
- Generates `.pyi` type stubs for the entire Ghidra API☆150Updated 2 months ago
- Code and exercises for a workshop on z3 and angr☆223Updated 4 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆296Updated 2 years ago
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆398Updated 3 years ago
- A comprehensive binary emulation and instrumentation platform.☆410Updated last year
- PoC 2019-2215 exploit for S8/S8 active with DAC + SELinux + Knox/RKP bypass☆222Updated 4 years ago
- Helper plugin for analyzing UEFI firmware☆90Updated 7 months ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆198Updated 4 years ago
- ☆237Updated 3 years ago
- ML-based ISA detection (architecture and endianness of binary code/sequences)☆64Updated last year
- A Framework for fuzzing USB Drivers by Device Emulation☆115Updated 3 years ago
- ☆222Updated last year