sondt99 / firmvisorLinks
A Python-based tool for analyzing IoT firmware, supporting both filesystem-based and RTOS-based (e.g. FreeRTOS, Zephyr) images. Features include binary header parsing, interrupt vector analysis, string extraction, entropy scanning, and more.
☆18Updated 2 months ago
Alternatives and similar repositories for firmvisor
Users that are interested in firmvisor are comparing it to the libraries listed below
Sorting:
- CTF Scoreboard Archive is a web app for storing and displaying CTF scoreboards, supporting links (CTFd, rCTF), MHTML uploads, and GIF gen…☆12Updated 8 months ago
- A powerful and flexible Python-based network scanning framework. Inspired by Nmap, designed to combine simplicity and effectiveness for b…☆31Updated 2 months ago
- A simple binary vulnerability scanner module for Linux that statically analyzes ELF binary files to identify potential vulnerabilities.☆18Updated 2 weeks ago
- ☆11Updated 9 months ago
- Sản phẩm "Cờ Caro cổ điển" - Project 1☆1Updated last year
- This project detects malicious or abnormal traffic in industrial control networks, visualizes network topology, and identifies compromise…☆11Updated 3 months ago
- Distributed Computing Interaction Framework: Optimizing the algorithm with the Server-Worker model☆18Updated last year
- CTF source code(s) from multiple websites.☆10Updated 2 months ago
- Windows Pwnable Study☆365Updated last month
- ☆19Updated last year
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆337Updated 3 months ago
- A web application dedicated to write sysmon configuration file☆11Updated 2 months ago
- Collection of Windows Privilege Escalation (Analyse/PoC/Exploit)☆418Updated 7 months ago
- Write-ups for various CTF☆192Updated last year
- ropr with some tweaks for better linux kernel support☆20Updated 2 months ago
- IDA/Binary Ninja Plugin to automatically identify and set enums for standard functions☆448Updated last month
- VFGadget locator to facilitate Counterfeit Object-Oriented Programming (COOP) and Loop-Oriented Programming (LOP) attacks to bypass advan…☆16Updated 4 months ago
- Centralized resource for listing and organizing known injection techniques and POCs☆588Updated last month
- Bài tập lớn IT3180 - Nhập môn Công nghệ phần mềm - Chủ đề Quản lý thu phí đóng góp của Tổ dân phố☆12Updated last year
- ☆21Updated last week
- Easily debug processes running in docker containers☆22Updated last year
- ☆13Updated 3 weeks ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆206Updated 3 months ago
- Reverse Engineering and Malware Analysis Roadmap☆289Updated 3 weeks ago
- GEF - GDB Enhanced Features for exploit devs & reversers☆506Updated this week
- Codebase for challenges in VHC_CTF_2023☆20Updated last year
- Important notes and topics on my journey towards mastering Windows Internals☆397Updated last year
- A research paper about the internals of memory management and heap exploitation☆25Updated 2 years ago
- ctf writeups by the rounding error team ✏️☆35Updated last month
- ☆10Updated last year