sondt99 / firmvisorLinks
A Python-based tool for analyzing IoT firmware, supporting both filesystem-based and RTOS-based (e.g. FreeRTOS, Zephyr) images. Features include binary header parsing, interrupt vector analysis, string extraction, entropy scanning, and more.
☆17Updated 8 months ago
Alternatives and similar repositories for firmvisor
Users that are interested in firmvisor are comparing it to the libraries listed below
Sorting:
- A powerful and flexible Python-based network scanning framework. Inspired by Nmap, designed to combine simplicity and effectiveness for b…☆31Updated last month
- CTF Scoreboard Archive is a web app for storing and displaying CTF scoreboards, supporting links (CTFd, rCTF), MHTML uploads, and GIF gen…☆12Updated last year
- A simple binary vulnerability scanner module for Linux that statically analyzes ELF binary files to identify potential vulnerabilities.☆18Updated 6 months ago
- ☆12Updated 5 months ago
- Distributed Computing Interaction Framework: Optimizing the algorithm with the Server-Worker model☆17Updated last year
- CTF source code(s) from multiple websites.☆10Updated 8 months ago
- This project detects malicious or abnormal traffic in industrial control networks, visualizes network topology, and identifies compromise…☆12Updated 9 months ago
- Windows Pwnable Study☆397Updated 6 months ago
- ☆23Updated 2 months ago
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆372Updated 9 months ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆421Updated last month
- Reverse Engineering and Malware Analysis Roadmap☆540Updated 3 months ago
- Bài tập lớn IT3180 - Nhập môn Công nghệ phần mềm - Chủ đề Quản lý thu phí đóng góp của Tổ dân phố☆12Updated last year
- ☆24Updated last year
- Write-ups for various CTF☆218Updated 4 months ago
- ropr with some tweaks for better linux kernel support☆35Updated 8 months ago
- Write-ups cho một số bài trên Reversing.kr☆12Updated 2 years ago
- IDA/Binary Ninja Plugin to automatically identify and set enums for standard functions☆483Updated 3 months ago
- The US Cyber Games 2022 Open CTF was a collaborative effort to test competitors in pwn, crypto, reverse engineering, forensics, and web c…☆29Updated 3 years ago
- 🎁A convenient glibc binary and debug file downloader and source code auto builder☆27Updated 11 months ago
- Reverse Engineering challenges☆36Updated 5 years ago
- Easily debug processes running in docker containers☆29Updated last year
- This is a very detailed Binary exploitation roadmap starting from the very first vulnerability to the latest , each one with its mitigati…☆22Updated 2 years ago
- Codebase for challenges in VHC_CTF_2023☆18Updated 2 years ago
- GEF - GDB Enhanced Features for exploit devs & reversers☆594Updated last week
- ☆264Updated 2 years ago
- ☆29Updated 2 years ago
- Collection of Windows Privilege Escalation (Analyse/PoC/Exploit)☆466Updated last year
- Repository to keep track of python memory corruption bugs that can be used to potentially bypass audit hooks☆61Updated 2 weeks ago
- Challenges for ImaginaryCTF 2025☆25Updated 4 months ago