Convert a raw firmware image to an ELF file.
☆14Feb 6, 2019Updated 7 years ago
Alternatives and similar repositories for fw2elf
Users that are interested in fw2elf are comparing it to the libraries listed below
Sorting:
- Tools that run inside the guest☆11Jan 2, 2020Updated 6 years ago
- Dump the contents of an RCO file from a PSVITA or PS4☆15Sep 4, 2020Updated 5 years ago
- A tool which tries to map CVEs from NVD to packages in supported ecosystems (Maven, NPM, PyPI).☆12Jul 12, 2025Updated 8 months ago
- PS4 system_fs_image.bin extractor☆14Aug 5, 2017Updated 8 years ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Nov 3, 2019Updated 6 years ago
- BINARLY Research Tools and PoCs☆40Sep 27, 2024Updated last year
- OCaml library to transform an Llvm control flow graph in an SMT formula.☆13Apr 20, 2018Updated 7 years ago
- Compiler Fingerprinting☆14Apr 24, 2015Updated 10 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- Unmaintained and incorrect - use LibOrbisPkg instead☆14Feb 2, 2017Updated 9 years ago
- BAP python bindings☆22Dec 1, 2023Updated 2 years ago
- scetool☆20Mar 12, 2026Updated last week
- Development Environment For Arm64, Android and Container☆11Feb 11, 2019Updated 7 years ago
- ☆16Jan 23, 2022Updated 4 years ago
- libs2e.so☆19Dec 19, 2020Updated 5 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Jan 15, 2017Updated 9 years ago
- Sample WinDbg extension☆15Jun 21, 2019Updated 6 years ago
- ☆22Jul 6, 2018Updated 7 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- A refactored Proof-of-concept originally developed in 2017 to print all function calls with their arguments data types and values using P…☆18May 28, 2021Updated 4 years ago
- ☆23May 21, 2019Updated 6 years ago
- Hardware and Software for the PicoGPSDO☆19Sep 3, 2024Updated last year
- ☆12Jul 3, 2019Updated 6 years ago
- My WIP bin, various interesting open-source work in progress☆11Aug 2, 2021Updated 4 years ago
- Random Codes Related to Reverse Engineering☆10Nov 24, 2022Updated 3 years ago
- A covert module that supports keystroke injection, keylogging, wireless access, and detection-evasion for red-team engagements☆44Feb 12, 2026Updated last month
- gradient-based symbolic execution engine implemented from scratch☆37Dec 16, 2023Updated 2 years ago
- Symbolic Execution of Android Framework☆15Jun 25, 2017Updated 8 years ago
- Some tee/trustzone helper stuff☆55Sep 29, 2019Updated 6 years ago
- Semantic Crash Bucketing☆16Sep 8, 2020Updated 5 years ago
- A C++ Library for Dealing with Semantic Versioning☆11Mar 17, 2020Updated 6 years ago
- Neural Network Semantic Parser for Almond☆15Apr 11, 2019Updated 6 years ago
- Loaders, scripts, and other misc boulsheet ported from IDA☆21Mar 18, 2019Updated 7 years ago
- Open Source EDK2 GDB Server☆14Jun 19, 2018Updated 7 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆22Aug 3, 2020Updated 5 years ago
- Customized version of QEMU 2.4.0 exposing the TCG frontend and the helpers☆18Dec 22, 2025Updated 3 months ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆16Apr 20, 2019Updated 6 years ago
- Artifacts for CO3: Concolic Co-execution for Firmware☆13Dec 30, 2024Updated last year
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago