zcutlip / nvram-fakerLinks
A simple library to intercept calls to libnvram when running embedded linux applications in emulated environments.
☆250Updated 2 years ago
Alternatives and similar repositories for nvram-faker
Users that are interested in nvram-faker are comparing it to the libraries listed below
Sorting:
- ☆153Updated 11 years ago
- ToolSet for VxWorks Based Embedded Device Analyses☆367Updated last year
- FIRM-AFL is the first high-throughput greybox fuzzer for IoT firmware.☆453Updated last year
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆417Updated 4 years ago
- A fuzzing tool for closed-source binaries based on Unicorn and LibFuzzer☆344Updated 6 years ago
- A firmware base address search tool.☆366Updated 5 years ago
- A simple shell script and two bash sourceable scripts used to build a static gdb-7.12 gdbserver using cross-compiler setups☆87Updated 8 years ago
- Fuzzer for Linux Kernel Drivers☆385Updated 3 years ago
- Prebuilt statically linked gdbserver and gawk executables for Linux on ARMEL, MIPS/MIPSEL and more platforms for use on embedded devices,…☆53Updated 8 years ago
- NVRAM emulator☆94Updated last year
- Public repository of statically compiled GDB and GDBServer☆391Updated 4 years ago
- lscan is a library identification tool on statically linked/stripped binaries☆405Updated 5 years ago
- Shared Library to intercept nvram get/set/match calls for emulating libnvram.so used by many IoT firmware software.☆68Updated 4 years ago
- My fork of American Fuzzy Lop☆61Updated 7 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆304Updated 2 years ago
- ☆250Updated 5 years ago
- AFL, with scripts to support other architectures.☆97Updated 7 years ago
- Improving AFL by using Intel PT to collect branch information☆292Updated 6 years ago
- ☆175Updated 6 years ago
- ☆286Updated 5 years ago
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆610Updated 2 years ago
- 🔍Heap analysis tool for CTF pwn.☆225Updated 4 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆203Updated 5 years ago
- ☆33Updated 6 years ago
- ☆226Updated 4 years ago
- A plugin for Hex-Ray's IDA Pro and radare2 to export the symbols recognized to the ELF symbol table☆213Updated 3 years ago
- QASan is a custom QEMU 3.1.1 that detects memory errors in the guest using AddressSanitizer.☆347Updated last year
- IDA script for highlighting and decoding ARM system instructions☆404Updated 4 years ago
- GDB plugin peda for arm☆146Updated 2 months ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆341Updated 6 years ago