wcooley / usbrevueLinks
USBREVue is a suite of tools for reverse-engineering USB devices.
☆49Updated 12 years ago
Alternatives and similar repositories for usbrevue
Users that are interested in usbrevue are comparing it to the libraries listed below
Sorting:
- ☆84Updated 7 years ago
 - BADFET☆45Updated 8 years ago
 - Shikra (http://int3.cc/products/the-shikra) programming utility☆44Updated 4 years ago
 - SIGSTOPing ELF binaries since 0x7E1☆55Updated last year
 - Migrated to Codeberg☆81Updated 3 years ago
 - Source code for the HorrorScope and material for the ScaCheapier workshop☆25Updated 5 years ago
 - Dump NOR/Parallel FLASH memory chips using an Arduino or Raspberry Pi☆45Updated 7 years ago
 - Android bootloader (aboot) parser☆64Updated last year
 - YAFFS extractor☆52Updated last year
 - Tool for visualizing and empirically analyzing information encoded in binary files☆79Updated 5 years ago
 - ☆49Updated 9 years ago
 - Tools for exploiting, reverse engineering, and deploying firmware to the S3FWRN5 and S3NRN82 Samsung NFC Controllers☆100Updated 5 years ago
 - RHme+ 2015 challenge☆113Updated 9 years ago
 - nü-map: a somewhat-more-modern (expeirmental) derivative of umap2 for modern FaceDancer☆29Updated last year
 - SIM Card tunnel for Alcatel OT-918D☆37Updated 11 years ago
 - ELF/PE/Mach-O parsing library☆26Updated last year
 - Nordic Semiconductor nRF5x series disassembly tools☆75Updated 7 years ago
 - Tools for analyzing hexagon code☆39Updated 9 years ago
 - Firmware reverse-engineering tools for i.MX NAND flash☆53Updated 11 months ago
 - Automated Android root via CVE-2016-5195 (dirtycow/dirtyc0w PoC)☆49Updated 8 years ago
 - Personal development branch for pcbre (probably not what you want)☆77Updated 2 years ago
 - scripts and examples for using JTAG debug tools to gain root access☆178Updated 9 years ago
 - Kernel and filesystem extractor☆60Updated 3 years ago
 - This is the code for the fault injection tutorial I wrote. Read the README for more information.☆13Updated 11 years ago
 - Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆57Updated 7 years ago
 - CANBadger - Hardware & Firmware Repository - An open-source automotive security research platform.☆64Updated 4 years ago
 - Software for Xmega-A1 Xplained board with MAX4619 glitch circuit☆40Updated 8 years ago
 - Python tool for dumping flash via uboot reliably☆27Updated 4 years ago
 - Tools to set up a usb sniffer on a beagleboard xM☆59Updated 10 years ago
 - ## No more updates as of early 2010. ## Security Toolkit for hardware and software reverse engineering. Online information is not forev…☆41Updated 9 years ago