theopolis / subzeroLinks
Firmware analysis gone wild.
☆41Updated 11 years ago
Alternatives and similar repositories for subzero
Users that are interested in subzero are comparing it to the libraries listed below
Sorting:
- A TE executable format loader for IDA☆28Updated 10 years ago
- an open source toolkit for PCI bus exploration☆72Updated 9 years ago
- ☆25Updated 10 years ago
- SIGSTOPing ELF binaries since 0x7E1☆57Updated last year
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆48Updated 9 years ago
- ☆38Updated 10 years ago
- Collection of scripts for radare2☆27Updated 7 years ago
- Memory awesomeness.☆29Updated 10 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆38Updated 7 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Updated 7 years ago
- Intel Management Engine firmware loader plugin for IDA☆93Updated 8 years ago
- Tools for viewing and extracting HDD firmware files☆77Updated 11 years ago
- lte security☆42Updated 10 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆65Updated 10 years ago
- ☆84Updated 7 years ago
- Integrity checking script for Apple Thunderbolt to Ethernet adapters, to check for attacks similar to Thunderstrike 2☆26Updated 10 years ago
- Misc PoCs for various research topics☆21Updated 3 years ago
- My UEFI security talk on ZeroNights 2015☆58Updated 10 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Updated 8 years ago
- Tools for reverse engineering the Utimaco Firmware☆44Updated 8 years ago
- ARM rop chain gadget searcher☆38Updated 8 years ago
- LPE exploits for Secret Net and Secret Net Studio☆52Updated 9 years ago
- A pure-python win32 debugger interface.☆28Updated 10 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 7 years ago
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0☆18Updated 14 years ago
- ☆35Updated 13 years ago
- Interactive Virtual Machine Introspection☆18Updated 8 years ago