☆54Oct 15, 2018Updated 7 years ago
Alternatives and similar repositories for IOTFuzzer_Full
Users that are interested in IOTFuzzer_Full are comparing it to the libraries listed below
Sorting:
- ☆13Apr 8, 2019Updated 6 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- TP-Link TL-WR1043ND - Authenticated Remote Code Execution☆16Jul 29, 2025Updated 7 months ago
- gopclntab finder and analyzer for Radare2☆21Aug 15, 2020Updated 5 years ago
- Mimojas Firmware Toolkit for unpacking and analysis firmware images☆14May 23, 2020Updated 5 years ago
- FIRM-AFL is the first high-throughput greybox fuzzer for IoT firmware.☆457Mar 22, 2024Updated last year
- ☆14Jul 8, 2019Updated 6 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆31Jan 17, 2022Updated 4 years ago
- Hexagon processor module for IDA Pro disassembler☆19Oct 11, 2022Updated 3 years ago
- EMUX Firmware Emulation Framework (formerly ARMX)☆843Aug 22, 2025Updated 6 months ago
- ☆37May 11, 2022Updated 3 years ago
- IDA MIPS静态扫描脚本,汇编审计辅助脚本☆174Jan 29, 2026Updated last month
- Control Flow Guard Teleportation demo☆23Jul 28, 2019Updated 6 years ago
- Shared Library to intercept nvram get/set/match calls for emulating libnvram.so used by many IoT firmware software.☆69Aug 10, 2021Updated 4 years ago
- File monitor for wafer maps, tester files, or about anything.☆13Aug 15, 2018Updated 7 years ago
- headless-ida-mcp-server☆30Apr 4, 2025Updated 11 months ago
- MINER provided by the paper "MINER: A Hybrid Data-Driven Approach for REST API Fuzzing"☆43Mar 15, 2023Updated 2 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- DupeKeyInjector☆134Apr 16, 2022Updated 3 years ago
- Advanced file format fuzzer based-on deep neural language models.☆41Apr 13, 2023Updated 2 years ago
- The parser-directed Fuzzer☆40May 22, 2020Updated 5 years ago
- ☆32Apr 28, 2022Updated 3 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Jun 24, 2017Updated 8 years ago
- A tool that turns the authoritative nameservers of DNS providers to resolvers and resolves the target domain list. Please think of this a…☆25Sep 19, 2019Updated 6 years ago
- SolarWinds Orion API 远程代码执行漏洞批量检测脚本☆10Jan 5, 2021Updated 5 years ago
- A (Miasm2 + binaryninja) based function divination.☆15Oct 22, 2017Updated 8 years ago
- Collection of projects for adding GNURadio to a REDHAWK Domain as a Component, thus enabling easy installation of flowgraphs into REDHAWK…☆14Jul 15, 2019Updated 6 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- ☆13May 5, 2018Updated 7 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Ghidra is a software reverse engineering (SRE) framework☆11Jan 2, 2025Updated last year
- Laniakea is a utility for managing instances at various cloud providers and aids in setting up a fuzzing cluster.☆27Jun 1, 2021Updated 4 years ago
- ☆45Mar 2, 2021Updated 5 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆74May 19, 2017Updated 8 years ago
- Some Proof-of-Concepts of bugs I found☆44Aug 26, 2019Updated 6 years ago
- ☆16Aug 14, 2024Updated last year
- Malware analysis tool based on taint analysis.☆14Jan 29, 2022Updated 4 years ago
- Pothos bindings for GNU Radio blocks☆12Dec 28, 2020Updated 5 years ago