theopolis / subzeroLinks
Firmware analysis gone wild.
☆41Updated 11 years ago
Alternatives and similar repositories for subzero
Users that are interested in subzero are comparing it to the libraries listed below
Sorting:
- A TE executable format loader for IDA☆28Updated 10 years ago
- ☆24Updated 10 years ago
- an open source toolkit for PCI bus exploration☆71Updated 8 years ago
- SIGSTOPing ELF binaries since 0x7E1☆55Updated last year
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆44Updated 9 years ago
- Tools for viewing and extracting HDD firmware files☆75Updated 11 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- ☆38Updated 9 years ago
- LPE exploits for Secret Net and Secret Net Studio☆51Updated 9 years ago
- Interactive Virtual Machine Introspection☆18Updated 8 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- An EFI image parser and dissector☆52Updated 12 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Updated 7 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- Binary Analysis Platform☆74Updated 11 years ago
- Integrity checking script for Apple Thunderbolt to Ethernet adapters, to check for attacks similar to Thunderstrike 2☆26Updated 10 years ago
- Fuzzer☆43Updated 10 years ago
- Misc PoCs for various research topics☆21Updated 3 years ago
- Memory awesomeness.☆29Updated 10 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆39Updated 7 years ago
- Static and Dynamic exploit analysis framework.☆22Updated 11 years ago
- lte security☆41Updated 9 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Updated 8 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 7 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆66Updated 10 years ago
- vstruct based dissectors for various file/protocol formats☆15Updated 8 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆49Updated 9 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process.☆65Updated 11 years ago