Firmware analysis gone wild.
☆41Aug 24, 2014Updated 11 years ago
Alternatives and similar repositories for subzero
Users that are interested in subzero are comparing it to the libraries listed below
Sorting:
- Crawl/download UEFI/BIOS updates from ISV/OEM distributors.☆80May 17, 2014Updated 11 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Linux Application Firewall☆58May 23, 2020Updated 5 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Mar 8, 2017Updated 8 years ago
- vstruct based dissectors for various file/protocol formats☆15Jul 27, 2017Updated 8 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- Analyze and manipulate binary data based on ELF symbol tables☆20Apr 3, 2024Updated last year
- Very simple runtime hooking library for OS X.☆15Aug 9, 2015Updated 10 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- Parse BIOS/Intel ME/UEFI firmware related structures: Volumes, FileSystems, Files, etc☆894Feb 17, 2026Updated last week
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Mar 16, 2017Updated 8 years ago
- Recover event log entries from an image by heurisitically looking for record structures.☆26Oct 9, 2015Updated 10 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Feb 9, 2016Updated 10 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Sep 5, 2016Updated 9 years ago
- An EFI image parser and dissector☆52Mar 20, 2013Updated 12 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- CTF exploit development and other tools of pwnage☆19May 30, 2019Updated 6 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- IDApro idc and idapython script collection☆28Aug 22, 2023Updated 2 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Aug 10, 2014Updated 11 years ago
- ☆30Apr 16, 2015Updated 10 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Sep 11, 2014Updated 11 years ago
- Static Php Analysis and Fuzzer☆26Apr 22, 2014Updated 11 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- Visualize your CRITs IOC's in Maltego☆12Jan 13, 2015Updated 11 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Tool used for converting Linux Kernel time jiffies, from iptables xt_recent timestamps, to human datetime☆13Feb 16, 2021Updated 5 years ago
- Yet another dynamic routine hooking library for OS X. Uses Mach exception handlers.☆11Feb 7, 2016Updated 10 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago