sondt99 / firmvisorLinks
A Python-based tool for analyzing IoT firmware, supporting both filesystem-based and RTOS-based (e.g. FreeRTOS, Zephyr) images. Features include binary header parsing, interrupt vector analysis, string extraction, entropy scanning, and more.
☆18Updated 7 months ago
Alternatives and similar repositories for firmvisor
Users that are interested in firmvisor are comparing it to the libraries listed below
Sorting:
- A powerful and flexible Python-based network scanning framework. Inspired by Nmap, designed to combine simplicity and effectiveness for b…☆31Updated 7 months ago
- CTF Scoreboard Archive is a web app for storing and displaying CTF scoreboards, supporting links (CTFd, rCTF), MHTML uploads, and GIF gen…☆12Updated last year
- A simple binary vulnerability scanner module for Linux that statically analyzes ELF binary files to identify potential vulnerabilities.☆18Updated 5 months ago
- ☆12Updated 3 months ago
- Distributed Computing Interaction Framework: Optimizing the algorithm with the Server-Worker model☆17Updated last year
- CTF source code(s) from multiple websites.☆10Updated 6 months ago
- ☆23Updated last year
- This project detects malicious or abnormal traffic in industrial control networks, visualizes network topology, and identifies compromise…☆11Updated 8 months ago
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆366Updated 8 months ago
- Windows Pwnable Study☆387Updated 5 months ago
- ☆21Updated last month
- Easily debug processes running in docker containers☆26Updated last year
- Write-ups for various CTF☆206Updated 2 months ago
- ropr with some tweaks for better linux kernel support☆32Updated 7 months ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆414Updated 2 weeks ago
- 🎁A convenient glibc binary and debug file downloader and source code auto builder☆23Updated 9 months ago
- ☆13Updated 5 months ago
- Source code for the DEF CON 33 CTF Qualifiers.☆54Updated 3 months ago
- IDA/Binary Ninja Plugin to automatically identify and set enums for standard functions☆473Updated last month
- various docs (that are interesting, or not, depending on the point of view...)☆130Updated last year
- GEF - GDB Enhanced Features for exploit devs & reversers☆574Updated this week
- Bài tập lớn IT3180 - Nhập môn Công nghệ phần mềm - Chủ đề Quản lý thu phí đóng góp của Tổ dân phố☆13Updated last year
- Repository to keep track of python memory corruption bugs that can be used to potentially bypass audit hooks☆56Updated last week
- Collection of Windows Privilege Escalation (Analyse/PoC/Exploit)☆461Updated last year
- A research paper about the internals of memory management and heap exploitation☆27Updated 2 years ago
- My notes on pwn☆289Updated 2 months ago
- A Python library to debug binary executables, your own way.☆284Updated last week
- An intuitive query API for IDA Pro☆162Updated last month
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆235Updated 11 months ago
- Challenges for ImaginaryCTF 2025☆24Updated 2 months ago