Convert a raw firmware image to an ELF file.
☆14Feb 6, 2019Updated 7 years ago
Alternatives and similar repositories for fw2elf
Users that are interested in fw2elf are comparing it to the libraries listed below
Sorting:
- A tool which tries to map CVEs from NVD to packages in supported ecosystems (Maven, NPM, PyPI).☆12Jul 12, 2025Updated 7 months ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Nov 3, 2019Updated 6 years ago
- Compiler Fingerprinting☆14Apr 24, 2015Updated 10 years ago
- Tools that run inside the guest☆11Jan 2, 2020Updated 6 years ago
- ☆13Oct 1, 2020Updated 5 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- BAP python bindings☆22Dec 1, 2023Updated 2 years ago
- Sample WinDbg extension☆15Jun 21, 2019Updated 6 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- Semantic Crash Bucketing☆16Sep 8, 2020Updated 5 years ago
- ☆12Jul 3, 2019Updated 6 years ago
- A covert module that supports keystroke injection, keylogging, wireless access, and detection-evasion for red-team engagements☆37Feb 12, 2026Updated 2 weeks ago
- ☆16Jan 23, 2022Updated 4 years ago
- Symbolic Execution of Android Framework☆15Jun 25, 2017Updated 8 years ago
- OCaml library to transform an Llvm control flow graph in an SMT formula.☆13Apr 20, 2018Updated 7 years ago
- Neural Network Semantic Parser for Almond☆15Apr 11, 2019Updated 6 years ago
- User defined static call-tree constraints in C++. This is the implementation of the tool for my masters thesis.☆14Sep 25, 2018Updated 7 years ago
- Hardware and Software for the PicoGPSDO☆19Sep 3, 2024Updated last year
- The Chef symbolic execution platform, based off S2E☆12Nov 1, 2022Updated 3 years ago
- ☆17Dec 9, 2022Updated 3 years ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆16Apr 20, 2019Updated 6 years ago
- Customized version of QEMU 2.4.0 exposing the TCG frontend and the helpers☆17Dec 22, 2025Updated 2 months ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆22Aug 3, 2020Updated 5 years ago
- Some VxWorks fuzzing examples using Cisco-Kitty and WDBDbg framework☆19Mar 13, 2016Updated 9 years ago
- SootDiff - Bytecode Comparison Across Different Java Compilers☆18May 24, 2024Updated last year
- libs2e.so☆19Dec 19, 2020Updated 5 years ago
- QEmu backend for avatar²☆22Mar 29, 2025Updated 11 months ago
- S2E plugins library☆17Jan 7, 2020Updated 6 years ago
- ☆22Jul 6, 2018Updated 7 years ago
- Vagrant setup for building a machine for CTF/exploit development☆21Apr 21, 2019Updated 6 years ago
- This novel black-box web vulnerability scanner attempts to infer the state machine of the web application.☆19Mar 12, 2020Updated 5 years ago
- Flounder is an old corpus collector I wrote, but it still works. Just need a Bing API key☆17Oct 25, 2019Updated 6 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆23Jun 8, 2022Updated 3 years ago
- Retro Game Engine inspired by the SNES-era☆25Sep 15, 2022Updated 3 years ago
- Some tee/trustzone helper stuff☆55Sep 29, 2019Updated 6 years ago
- Our backup exploitation technique: fuzzing for POVs!☆24Aug 20, 2016Updated 9 years ago
- Linux kernels (CGC DECREE and vanilla) with S2E extensions☆24Jul 6, 2024Updated last year
- 802.15.4 Fuzzer☆21Mar 25, 2019Updated 6 years ago