Firmware analysis gone wild.
☆41Aug 24, 2014Updated 11 years ago
Alternatives and similar repositories for subzero
Users that are interested in subzero are comparing it to the libraries listed below
Sorting:
- Crawl/download UEFI/BIOS updates from ISV/OEM distributors.☆80May 17, 2014Updated 11 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- An EFI image parser and dissector☆52Mar 20, 2013Updated 13 years ago
- Parse BIOS/Intel ME/UEFI firmware related structures: Volumes, FileSystems, Files, etc☆896Feb 27, 2026Updated 3 weeks ago
- Reconstructed exynos5410 firmware☆16Jan 7, 2022Updated 4 years ago
- Linux Application Firewall☆59May 23, 2020Updated 5 years ago
- Analyze and manipulate binary data based on ELF symbol tables☆20Apr 3, 2024Updated last year
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- Visualize your CRITs IOC's in Maltego☆12Jan 13, 2015Updated 11 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Mar 8, 2017Updated 9 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Sep 5, 2016Updated 9 years ago
- Very simple runtime hooking library for OS X.☆15Aug 9, 2015Updated 10 years ago
- Tools for IDA☆13May 25, 2016Updated 9 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Aug 10, 2014Updated 11 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- ☆30Apr 16, 2015Updated 10 years ago
- Recover event log entries from an image by heurisitically looking for record structures.☆26Oct 9, 2015Updated 10 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Deobfuscation utilities for HDD/SSD firmware images☆78Jan 10, 2019Updated 7 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆40Mar 16, 2017Updated 9 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆65Sep 15, 2015Updated 10 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- vstruct based dissectors for various file/protocol formats☆15Jul 27, 2017Updated 8 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Feb 9, 2016Updated 10 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- Support UEFI load☆11Oct 1, 2015Updated 10 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Kernel Shellcode to add all privileges in token☆15Mar 13, 2017Updated 9 years ago
- Static Php Analysis and Fuzzer☆26Apr 22, 2014Updated 11 years ago
- CoreFollowUp phishing attack on macOS☆15Mar 15, 2022Updated 4 years ago
- Learning a bit of assembly programming☆13Mar 23, 2015Updated 10 years ago