Convert a raw firmware image to an ELF file.
☆14Feb 6, 2019Updated 7 years ago
Alternatives and similar repositories for fw2elf
Users that are interested in fw2elf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tools that run inside the guest☆11Jan 2, 2020Updated 6 years ago
- Dump the contents of an RCO file from a PSVITA or PS4☆16Sep 4, 2020Updated 5 years ago
- A tool which tries to map CVEs from NVD to packages in supported ecosystems (Maven, NPM, PyPI).☆12Jul 12, 2025Updated 9 months ago
- PS4 system_fs_image.bin extractor☆14Aug 5, 2017Updated 8 years ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Nov 3, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- BINARLY Research Tools and PoCs☆39Sep 27, 2024Updated last year
- OCaml library to transform an Llvm control flow graph in an SMT formula.☆13Apr 20, 2018Updated 7 years ago
- Compiler Fingerprinting☆14Apr 24, 2015Updated 10 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- Unmaintained and incorrect - use LibOrbisPkg instead☆15Feb 2, 2017Updated 9 years ago
- BAP python bindings☆23Dec 1, 2023Updated 2 years ago
- scetool☆20Mar 12, 2026Updated 3 weeks ago
- Development Environment For Arm64, Android and Container☆11Feb 11, 2019Updated 7 years ago
- ☆16Jan 23, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- libs2e.so☆19Dec 19, 2020Updated 5 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Jan 15, 2017Updated 9 years ago
- Sample WinDbg extension☆15Jun 21, 2019Updated 6 years ago
- ☆22Jul 6, 2018Updated 7 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- A refactored Proof-of-concept originally developed in 2017 to print all function calls with their arguments data types and values using P…☆18May 28, 2021Updated 4 years ago
- ☆23May 21, 2019Updated 6 years ago
- Hardware and Software for the PicoGPSDO☆19Sep 3, 2024Updated last year
- ☆12Jul 3, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- My WIP bin, various interesting open-source work in progress☆11Aug 2, 2021Updated 4 years ago
- Random Codes Related to Reverse Engineering☆10Nov 24, 2022Updated 3 years ago
- gradient-based symbolic execution engine implemented from scratch☆37Dec 16, 2023Updated 2 years ago
- Symbolic Execution of Android Framework☆15Jun 25, 2017Updated 8 years ago
- Semantic Crash Bucketing☆16Sep 8, 2020Updated 5 years ago
- Some tee/trustzone helper stuff☆56Sep 29, 2019Updated 6 years ago
- A C++ Library for Dealing with Semantic Versioning☆11Mar 17, 2020Updated 6 years ago
- Neural Network Semantic Parser for Almond☆15Apr 11, 2019Updated 7 years ago
- Loaders, scripts, and other misc boulsheet ported from IDA☆21Mar 18, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Open Source EDK2 GDB Server☆14Jun 19, 2018Updated 7 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆22Aug 3, 2020Updated 5 years ago
- Customized version of QEMU 2.4.0 exposing the TCG frontend and the helpers☆18Dec 22, 2025Updated 3 months ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆16Apr 20, 2019Updated 6 years ago
- Artifacts for CO3: Concolic Co-execution for Firmware☆13Dec 30, 2024Updated last year
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- ☆13Oct 1, 2020Updated 5 years ago