Pre-OS microcode updater
☆43Aug 25, 2018Updated 7 years ago
Alternatives and similar repositories for MicroRenovator
Users that are interested in MicroRenovator are comparing it to the libraries listed below
Sorting:
- Android Automation Tool☆21May 9, 2018Updated 7 years ago
- Platform Firmware Auditing Tool☆131Sep 7, 2018Updated 7 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆164Mar 15, 2018Updated 7 years ago
- [BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack☆107Jan 6, 2023Updated 3 years ago
- Tool for introspection of SSL\TLS sessions☆142Jan 26, 2026Updated last month
- ☆79Aug 4, 2022Updated 3 years ago
- ☆137Mar 20, 2019Updated 6 years ago
- Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.☆209Nov 16, 2018Updated 7 years ago
- Open source Active Directory security audit framework.☆137Jan 15, 2018Updated 8 years ago
- Collecting & Hunting for IOCs with gusto and style☆240Aug 1, 2021Updated 4 years ago
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆223Apr 15, 2019Updated 6 years ago
- a CLI for ephemeral penetration testing☆16Dec 10, 2019Updated 6 years ago
- Graphical Realism Framework for Industrial Control Simulations☆225Jun 20, 2024Updated last year
- JTAGulator: Assisted discovery of on-chip debug interfaces☆765Jul 29, 2025Updated 7 months ago
- An Android app that lets you use your access control card cloning devices in the field.☆483Jul 27, 2019Updated 6 years ago
- Open Source Threat Intelligence Chat Bot☆322Mar 30, 2020Updated 5 years ago
- WEB SERVICE SECURITY ASSESSMENT TOOL☆390Sep 24, 2021Updated 4 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆214Jun 23, 2020Updated 5 years ago
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆424Updated this week
- 常规漏洞+逻辑漏洞+配置漏洞+漏洞分析☆10Nov 29, 2019Updated 6 years ago
- Windows Hypervisor Platform client☆31Jun 13, 2018Updated 7 years ago
- Vulnerability Scanner☆11Dec 23, 2014Updated 11 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- DejaVU - Open Source Deception Framework☆426Aug 2, 2025Updated 6 months ago
- A Bluetooth low energy capture the flag☆746Aug 11, 2025Updated 6 months ago
- DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the D…☆837Nov 19, 2024Updated last year
- ChipWhisperer - the complete open-source toolchain for side-channel power analysis and glitching attacks☆1,416Updated this week
- This repository discloses a critical vulnerability in Apple’s A16 Bionic chip, where debug logic is executed on production-fused devices …☆15Sep 7, 2025Updated 5 months ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- A bootrom exploit for MediaTek devices☆20Apr 25, 2023Updated 2 years ago
- ntos internals☆23Dec 28, 2019Updated 6 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Jan 29, 2020Updated 6 years ago
- Files compiled from the Logica breach investigation materials☆45Aug 14, 2018Updated 7 years ago
- First IDE for Nmap Script (NSE) Development.☆359Aug 8, 2020Updated 5 years ago
- Exploit the hack for IOS 11.1.2 and earlier to collect leaked information.☆86Dec 12, 2017Updated 8 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Aug 6, 2018Updated 7 years ago
- Graphical ROP chain builder using radare2 and r2pipe☆53Dec 21, 2017Updated 8 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Mar 26, 2019Updated 6 years ago
- x86 Dynamic Binary Translator Library☆34Dec 19, 2020Updated 5 years ago