sheabot / binwalk-dockerLinks
Docker container with all extra tools installed to get the most out of binwalk
☆18Updated 4 years ago
Alternatives and similar repositories for binwalk-docker
Users that are interested in binwalk-docker are comparing it to the libraries listed below
Sorting:
- FirmSec Dataset☆38Updated 2 years ago
- ☆61Updated last year
- ☆89Updated 4 months ago
- ☆37Updated 3 months ago
- ☆48Updated 3 months ago
- ☆30Updated 2 years ago
- A Universal MCU Firmware Emulator for Dynamic Analysis without Any Hardware Dependence.☆142Updated last year
- ☆96Updated 2 years ago
- StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing☆96Updated last year
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆71Updated 8 months ago
- ☆28Updated 2 years ago
- Perry: automated peripheral modeling with symbolic execution☆27Updated last year
- Binary Code Similarity Analysis (BCSA) Benchmark☆158Updated last year
- ☆230Updated last year
- ☆77Updated 3 months ago
- A Specification-Guided Approach for Firmware Emulation☆42Updated 3 months ago
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆63Updated last year
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆139Updated last year
- ☆38Updated last year
- ☆38Updated 2 years ago
- Repository for monolithic firmware blobs☆83Updated 3 years ago
- ☆56Updated last year
- ☆70Updated last year
- a blackbox network fuzzer for IoT devices☆54Updated 11 months ago
- A toolkit for conducting multiple static binary analysis based on Ghidra.☆20Updated 3 months ago
- ☆34Updated 2 years ago
- ☆292Updated last year
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆41Updated last year
- angr's exploration technique to perform taint analysis☆65Updated 5 years ago
- Recent security papers on firmware analysis☆76Updated 3 years ago