A faster firmware base address scanner.
☆58May 2, 2022Updated 3 years ago
Alternatives and similar repositories for basefind2
Users that are interested in basefind2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Finds the base address of a firmware by comparing string addresses with target pointer addresses☆53Mar 9, 2025Updated last year
- A firmware base address search tool.☆374Sep 27, 2020Updated 5 years ago
- [MIRROR] OpenWrt firmware image utilities☆18Updated this week
- Library for constructing data-centric processing pipelines☆12Mar 16, 2026Updated last week
- Collection of random files and tools I wrote to assist in reverse engineering and hacking the Withings WS-30 bathroom scale.☆71Oct 19, 2015Updated 10 years ago
- Raw binary firmware analysis software☆568Jun 6, 2024Updated last year
- ropr with some tweaks for better linux kernel support☆38Apr 25, 2025Updated 10 months ago
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆40Jun 16, 2024Updated last year
- A tool for automating interactions with Android devices - including ADB, AndroGuard, and Frida interactivity.☆163Apr 14, 2024Updated last year
- Find command injection and format string bugs in binaries☆17Feb 2, 2024Updated 2 years ago
- 2020腾讯游戏安全技术竞赛机器学习组优秀奖源码☆10Apr 16, 2020Updated 5 years ago
- ☆22Jul 8, 2022Updated 3 years ago
- A series of 010 Editor templates for Switch formats☆20Apr 8, 2020Updated 5 years ago
- A Binary Ninja plugin for importing IDC database dumps from IDA.☆41Oct 13, 2022Updated 3 years ago
- BDF is a Python tool designed to spin-up pseudo random vulnerable Android applications for training when it comes to vulnerability resear…☆47Apr 14, 2024Updated last year
- Opensource repository for DVID V2☆16Jun 3, 2025Updated 9 months ago
- 🖱2021腾讯游戏安全技术竞赛-机器学习 4th☆11Apr 19, 2021Updated 4 years ago
- A collection of my weggli patterns to facilitate vulnerability research.☆155Mar 9, 2026Updated 2 weeks ago
- Microsoft’s cyber physical system researchers recently identified multiple high-severity vulnerabilities in the CODESYS V3 software devel…☆53Aug 14, 2023Updated 2 years ago
- AttifyOS 4.0☆92Apr 30, 2024Updated last year
- pwntools library implementation in c++☆49Apr 11, 2021Updated 4 years ago
- ECED440 Computer Security☆11Mar 17, 2026Updated last week
- Lazy Bloodhound is a toy PHP static code analyzer built on tree-sitter☆13Feb 19, 2021Updated 5 years ago
- List of common Diffie-Hellman groups☆11Jul 11, 2017Updated 8 years ago
- ☆36Sep 30, 2020Updated 5 years ago
- Binary matching with Binary Ninja☆22Jul 8, 2024Updated last year
- ☆19Jun 24, 2022Updated 3 years ago
- IDA SIG files for multiarch uClibc library☆38Jun 20, 2018Updated 7 years ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- Quokka: A Fast and Accurate Binary Exporter☆212Mar 13, 2026Updated last week
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Aug 11, 2020Updated 5 years ago
- Useful tools for writing shellcode☆69May 10, 2020Updated 5 years ago
- BAP python bindings☆22Dec 1, 2023Updated 2 years ago
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆67Feb 23, 2026Updated last month
- Emulating firmware poorly but quickly!☆16Dec 18, 2020Updated 5 years ago
- Zyxel password decrypter☆44May 3, 2022Updated 3 years ago
- 修复停止维护的Vxhunter IDA插件项目在python3高些的版本下运行的若干问题☆14Aug 26, 2024Updated last year
- Simulate firmware with one click of firmadyne (使用 firmadyne 一键模拟固件)☆367Aug 18, 2024Updated last year
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year