zyw-200 / EQUAFLView external linksLinks
☆31May 28, 2023Updated 2 years ago
Alternatives and similar repositories for EQUAFL
Users that are interested in EQUAFL are comparing it to the libraries listed below
Sorting:
- ☆26Apr 13, 2022Updated 3 years ago
- ☆27Dec 29, 2024Updated last year
- ☆69Nov 1, 2023Updated 2 years ago
- ☆238Jan 14, 2024Updated 2 years ago
- ☆11Jul 4, 2023Updated 2 years ago
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆339Dec 12, 2024Updated last year
- patch presence test via symbolic signatures, ICSE'24☆12Mar 29, 2024Updated last year
- Recent security papers on firmware analysis☆78Aug 30, 2021Updated 4 years ago
- Export IDA microcode to BinExport format so that you can use BinDiff to diff microcodes☆12Sep 21, 2024Updated last year
- shttpd - HTTP服务器代码注释☆16Sep 12, 2020Updated 5 years ago
- ☆94Mar 31, 2025Updated 10 months ago
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs☆16Nov 7, 2022Updated 3 years ago
- 存储iot设备分析工具和分析文件☆14May 28, 2021Updated 4 years ago
- Collections of xiaomi/mijia MIIO documents/examples/firmwares☆14Jun 30, 2021Updated 4 years ago
- A binary-only coverage-guided fuzzer based on AFL and e9patch☆18Oct 13, 2020Updated 5 years ago
- Analyze IoT firmware☆17Apr 24, 2021Updated 4 years ago
- This script automates the process of refreshing pseudocode, renaming symbols, and saving the updated IDA database for all functions in a …☆18Feb 27, 2025Updated 11 months ago
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆421Sep 18, 2021Updated 4 years ago
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆16Sep 11, 2020Updated 5 years ago
- The fuzzing framework named SHADOWFUZZER to find clientside vulnerabilities when processing incoming MQTT messages.☆20May 10, 2023Updated 2 years ago
- Router Vulnerabilities Scanner☆14Jun 1, 2020Updated 5 years ago
- ☆78Sep 2, 2022Updated 3 years ago
- Zyxel password decrypter☆44May 3, 2022Updated 3 years ago
- An automated static taint analysis tool for the Lua web framework.☆24Sep 27, 2024Updated last year
- ICSE'23 - CoFuzz: Coordinated hybrid fuzzing framework with advanced coordination mode☆47Nov 16, 2023Updated 2 years ago
- IoT firmware vulnerability analysis tool based on binary code similarity analysis (BCSA)☆23Jul 6, 2022Updated 3 years ago
- ☆19Apr 7, 2023Updated 2 years ago
- CodeQL library and queries for iterator invalidation☆22May 5, 2021Updated 4 years ago
- Source code of MEUZZ fuzzer☆46Dec 11, 2021Updated 4 years ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Sep 16, 2022Updated 3 years ago
- FIRM-AFL is the first high-throughput greybox fuzzer for IoT firmware.☆457Mar 22, 2024Updated last year
- Merge multi binaries into one IDA database.☆24Jan 18, 2022Updated 4 years ago
- Blogpost about optimizing binary-only fuzzing with AFL++☆71Oct 7, 2023Updated 2 years ago
- Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis☆826Dec 25, 2025Updated last month
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆121Oct 18, 2025Updated 3 months ago
- ☆65Jun 21, 2024Updated last year
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆23Nov 20, 2019Updated 6 years ago
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆30Feb 23, 2019Updated 6 years ago
- ☆32Mar 25, 2025Updated 10 months ago