sondt99 / firmvisorLinks
A Python-based tool for analyzing IoT firmware, supporting both filesystem-based and RTOS-based (e.g. FreeRTOS, Zephyr) images. Features include binary header parsing, interrupt vector analysis, string extraction, entropy scanning, and more.
☆19Updated 9 months ago
Alternatives and similar repositories for firmvisor
Users that are interested in firmvisor are comparing it to the libraries listed below
Sorting:
- A powerful and flexible Python-based network scanning framework. Inspired by Nmap, designed to combine simplicity and effectiveness for b…☆32Updated 2 months ago
- CTF Scoreboard Archive is a web app for storing and displaying CTF scoreboards, supporting links (CTFd, rCTF), MHTML uploads, and GIF gen…☆12Updated last year
- ☆12Updated 6 months ago
- A simple binary vulnerability scanner module for Linux that statically analyzes ELF binary files to identify potential vulnerabilities.☆18Updated 7 months ago
- Distributed Computing Interaction Framework: Optimizing the algorithm with the Server-Worker model☆18Updated last year
- This project detects malicious or abnormal traffic in industrial control networks, visualizes network topology, and identifies compromise…☆14Updated 10 months ago
- Windows Pwnable Study☆403Updated 7 months ago
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆373Updated 10 months ago
- ☆25Updated last year
- ☆23Updated 3 months ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆436Updated 2 months ago
- Write-ups for various CTF☆217Updated 5 months ago
- ☆13Updated 7 months ago
- Write-ups cho một số bài trên Reversing.kr☆12Updated 2 years ago
- Easily debug processes running in docker containers☆29Updated last year
- Reverse Engineering challenges☆36Updated 5 years ago
- Collection of Windows Privilege Escalation (Analyse/PoC/Exploit)☆468Updated last year
- FSOP Again☆32Updated 3 years ago
- Reverse Engineering and Malware Analysis Roadmap☆580Updated 4 months ago
- The US Cyber Games 2022 Open CTF was a collaborative effort to test competitors in pwn, crypto, reverse engineering, forensics, and web c…☆29Updated 3 years ago
- IDA/Binary Ninja Plugin to automatically identify and set enums for standard functions☆486Updated 4 months ago
- ☆29Updated 2 years ago
- 🚩 framework for kernel memory exploitation (WIP)☆22Updated 6 months ago
- Bài tập lớn IT3180 - Nhập môn Công nghệ phần mềm - Chủ đề Quản lý thu phí đóng góp của Tổ dân phố☆12Updated 2 years ago
- Repository to keep track of python memory corruption bugs that can be used to potentially bypass audit hooks☆64Updated last month
- A Python library to debug binary executables, your own way.☆294Updated this week
- This is a very detailed Binary exploitation roadmap starting from the very first vulnerability to the latest , each one with its mitigati…☆22Updated 2 years ago
- 🎁A convenient glibc binary and debug file downloader and source code auto builder☆30Updated last year
- Codebase for challenges in VHC_CTF_2023☆18Updated 2 years ago
- An intuitive query API for IDA Pro☆165Updated 3 months ago