sheabot / binwalk-dockerLinks
Docker container with all extra tools installed to get the most out of binwalk
☆20Updated 5 years ago
Alternatives and similar repositories for binwalk-docker
Users that are interested in binwalk-docker are comparing it to the libraries listed below
Sorting:
- FirmSec Dataset☆46Updated 3 months ago
- ☆94Updated 10 months ago
- ☆69Updated 2 years ago
- ☆31Updated 2 years ago
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆82Updated last year
- Firmrec is a recurring vulnerability detector for embedded firmware.☆50Updated 8 months ago
- ☆93Updated 8 months ago
- Real firmware fuzz-tested in P2IM paper☆24Updated 5 years ago
- Repository for monolithic firmware blobs☆88Updated 3 years ago
- StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing☆97Updated 2 years ago
- ☆63Updated last year
- ☆58Updated 8 months ago
- A Universal MCU Firmware Emulator for Dynamic Analysis without Any Hardware Dependence.☆144Updated 2 years ago
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆64Updated 2 years ago
- A Specification-Guided Approach for Firmware Emulation☆44Updated 9 months ago
- This is the source code for AIM paper (accepted to IEEE Transactions on Dependable and Secure Computing in 2023)☆30Updated last year
- ☆238Updated 2 years ago
- Binary Code Similarity Analysis (BCSA) Benchmark☆171Updated 2 years ago
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆141Updated 2 years ago
- ☆47Updated 2 years ago
- Perry: automated peripheral modeling with symbolic execution☆28Updated last year
- ☆97Updated 4 months ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆63Updated 6 months ago
- Recent security papers on firmware analysis☆78Updated 4 years ago
- ☆33Updated 2 years ago
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs☆15Updated 3 years ago
- a blackbox network fuzzer for IoT devices☆56Updated last year
- ☆27Updated last year
- Cottontail: A LLM-Driven Concolic Execution Engine (Accepted by IEEE S&P'26)☆29Updated last month
- ☆72Updated last year