travisgoodspeed / goodasmLinks
A portable assembler for Z80, 8080, Gameboy, 6805, 8051 and others.
☆36Updated this week
Alternatives and similar repositories for goodasm
Users that are interested in goodasm are comparing it to the libraries listed below
Sorting:
- A collection of interesting ELF files for inspiration and testing☆29Updated 2 years ago
- ☆49Updated 2 months ago
- Extract bits from photos☆89Updated 5 years ago
- Mask ROM decoding utilities☆72Updated 2 years ago
- yxd - Yuu's heX Dumper☆89Updated last year
- CPU Adventure task from Dragon CTF 2019 teaser☆31Updated last month
- Determine which CPU architecture is used in a binary file.☆121Updated 4 months ago
- Identify and extract files from container formats using unblob.☆25Updated 8 months ago
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- A Ghidra Loader for STM32 CPUs (WIP)☆38Updated 3 years ago
- Minimal setup to trigger the xz backdoor☆28Updated 9 months ago
- ☆11Updated 2 years ago
- decode bits into bytes☆46Updated 5 years ago
- ☆14Updated 2 years ago
- Binary Ninja plugin for the Avnera AV6xxx/AV7xxx architecture☆28Updated 3 months ago
- iTLB multihit PoC☆41Updated last year
- A step towards automating the creation of Ghidra processor modules☆37Updated 3 months ago
- A guide to silicon reverse engineering by optical microscophy☆13Updated 6 months ago
- x86 decoders for the yaxpeax project☆138Updated last month
- A stealthy ELF loader - no files, no execve, no RWX☆168Updated last year
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆85Updated 2 years ago
- simple type recognition in decompiled executables☆112Updated last year
- Minimal CPU Emulator Powered by the ARM PL080 DMA Controller☆36Updated 11 months ago
- ☆27Updated 2 years ago
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆48Updated 8 months ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆47Updated last month
- Reverse engineering the TI AM3358 boot ROM☆53Updated 10 months ago
- ☆41Updated last year
- Extracting bits from Microscope images of ROM Constants, and disassembling them into readable 8051 assembly code☆22Updated 4 years ago
- Binary Golf Grand Prix☆112Updated last year