yinfeidi / Firmware-fuzz-toolView external linksLinks
☆15Aug 16, 2021Updated 4 years ago
Alternatives and similar repositories for Firmware-fuzz-tool
Users that are interested in Firmware-fuzz-tool are comparing it to the libraries listed below
Sorting:
- ☆32Apr 28, 2022Updated 3 years ago
- ☆12May 6, 2020Updated 5 years ago
- cybersecurity conference materials☆15Sep 1, 2019Updated 6 years ago
- source code analysis workshop☆17Mar 7, 2021Updated 4 years ago
- ☆18Aug 5, 2020Updated 5 years ago
- My notebook about the study of IoT Home Security.☆18Feb 27, 2020Updated 5 years ago
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Dec 11, 2022Updated 3 years ago
- Automotive Security Toolkit☆24Updated this week
- ☆27Jul 31, 2021Updated 4 years ago
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆23Nov 20, 2019Updated 6 years ago
- FIRM-AFL is the first high-throughput greybox fuzzer for IoT firmware.☆457Mar 22, 2024Updated last year
- Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis☆826Dec 25, 2025Updated last month
- 2021西湖论剑IoT、虚实结合赛后开放资源☆65Mar 18, 2022Updated 3 years ago
- SyzScope is a research project that aims to reveal high-risk security bugs on Syzbot. Learn more details in our paper.☆84Jan 20, 2025Updated last year
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆34Nov 7, 2021Updated 4 years ago
- A hacky tool for analysing linux kernel commits☆38Feb 7, 2023Updated 3 years ago
- ProXBBE (Protocol eXtraction By Binary Execution)☆31Sep 21, 2017Updated 8 years ago
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆141Oct 14, 2023Updated 2 years ago
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆339Dec 12, 2024Updated last year
- A versatile and easy-to-use static binary patching tool.☆54Sep 16, 2025Updated 4 months ago
- ☆33Jan 14, 2026Updated last month
- Pseudo-Intel-CET functionality plugin based on QEMU 8.2.2 plugin system, with minor modifications to QEMU TCG body code to adapt to Glibc…☆14Jun 5, 2024Updated last year
- ConfFuzz - Fuzzing for Interface Vulnerabilities☆47May 1, 2023Updated 2 years ago
- 常用蓝牙漏洞CVE poc、EXP☆38Aug 22, 2018Updated 7 years ago
- ToolSet for VxWorks Based Embedded Device Analyses☆373Sep 24, 2024Updated last year
- ☆10Feb 8, 2021Updated 5 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- My version of driller using Intel PIN and angrgdb. In "theory" can work with AFL in deferred and persistent mode.☆13Feb 10, 2019Updated 7 years ago
- ☆10Jan 15, 2021Updated 5 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- Forward-looking approach in process mining (using system dynamics and process mining to simulate business processes)☆12Feb 16, 2023Updated 2 years ago
- A python implementation of the paper "GraRep: Learning Graph Representations with Global Structural Information".☆11Jun 7, 2017Updated 8 years ago
- Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.☆10Sep 18, 2016Updated 9 years ago
- ☆11Jan 6, 2020Updated 6 years ago
- IP格式整理脚本☆10Nov 11, 2021Updated 4 years ago
- I just wanted to try to do it myself. No more updates for the moment as the firmware is now too big for the radio's memory.☆10Jan 15, 2024Updated 2 years ago
- crawling china stock recommendation from Sina Weibo, create pyecharts for data☆11Jan 26, 2018Updated 8 years ago
- ☆11Aug 21, 2024Updated last year
- ☆12Nov 14, 2023Updated 2 years ago