存储iot设备分析工具和分析文件
☆14May 28, 2021Updated 4 years ago
Alternatives and similar repositories for iot
Users that are interested in iot are comparing it to the libraries listed below
Sorting:
- ☆11Sep 7, 2023Updated 2 years ago
- qemu-system by docker-compose☆13Jun 14, 2022Updated 3 years ago
- ☆26Apr 13, 2022Updated 3 years ago
- Pointer analysis prototype (currently including anderson, steensgard).☆16Dec 20, 2021Updated 4 years ago
- shttpd - HTTP服务器代码注释☆16Sep 12, 2020Updated 5 years ago
- Analyze IoT firmware☆17Apr 24, 2021Updated 4 years ago
- Generate data-flow graph and def-use graph for a function based on miasm and IDA Pro.☆21May 17, 2022Updated 3 years ago
- Turning Your Computer Into a GPS Tracker With Apple Maps☆18Feb 6, 2024Updated 2 years ago
- ☆23Jun 22, 2024Updated last year
- 小爱音箱固件降级。☆36Apr 29, 2022Updated 3 years ago
- Router Vulnerabilities Scanner☆14Jun 1, 2020Updated 5 years ago
- QilingLab challenge writeup☆22Sep 25, 2021Updated 4 years ago
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆16Sep 11, 2020Updated 5 years ago
- 一个辅助提交 CNVD/CNNVD/CVE 漏洞的工具☆20Jun 20, 2022Updated 3 years ago
- 智能家居安全相关参考。The related reference of smart home security including: paper, website, topic of Mi IoT.☆78May 12, 2022Updated 3 years ago
- A toolkit for conducting multiple static binary analysis based on Ghidra.☆24May 1, 2025Updated 10 months ago
- ☆27Apr 28, 2023Updated 2 years ago
- ☆31May 28, 2023Updated 2 years ago
- Zyxel 防火墙远程命令注入漏洞(CVE-2022-30525)☆22May 13, 2022Updated 3 years ago
- Merge multi binaries into one IDA database.☆24Jan 18, 2022Updated 4 years ago
- Practical P-Code examples☆66Feb 12, 2021Updated 5 years ago
- 毕业设计 C-V2X漏洞挖掘 开放资源☆66Jun 15, 2022Updated 3 years ago
- ☆30Sep 13, 2024Updated last year
- ☆65Jun 21, 2024Updated last year
- ☆67Jun 27, 2022Updated 3 years ago
- ☆32Mar 25, 2025Updated 11 months ago
- Challenges and solutions for Maple CTF 2022.☆28Sep 15, 2022Updated 3 years ago
- My CTF Writeup☆28Nov 20, 2024Updated last year
- Collect some iot-related security articles, including vulnerability analysis, security conferences and papers, etc.☆300Jan 23, 2025Updated last year
- Browser Fuzz Summarize / 浏览器模糊测试综述☆142Oct 4, 2020Updated 5 years ago
- IoT安全教程☆299Mar 19, 2020Updated 5 years ago
- ☆298Jun 21, 2022Updated 3 years ago
- ☆41May 7, 2024Updated last year
- IDA Hexrays To Joern☆44Nov 7, 2024Updated last year
- ☆47May 27, 2023Updated 2 years ago
- Witcher is the first framework for using AFL to fuzz web applications.☆103Nov 28, 2023Updated 2 years ago
- driver manual mapper☆12Feb 22, 2020Updated 6 years ago
- This repository contains 4000 vulnerable hardware designs. Currently this is in Jsonl format for directly using it for fine-tuning LLMs. …☆21Mar 25, 2025Updated 11 months ago
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 5 years ago