Guide on emulating Raspberry Pi with QEMU and exploring Arm TrustZone research.
angr is a platform-agnostic binary analysis framework brought to you by the Computer Security Lab at UC Santa Barbara, SEFCOM at Arizona State University, their associated CTF team, Shellphish, the open source community, and @rhelmot. It is a suite of Python 3 libraries that enable tasks such as disassembly, lifting, program instrumentation, symbolic execution, control-flow analysis, data-dependency analysis, value-set analysis, and decompilation. The most common operation is loading a binary using angr.Project('/bin/bash').
Guide on emulating Raspberry Pi with QEMU and exploring Arm TrustZone research.
Copy executables with execute, but no read permission on Unix systems.
VolatilityBot automates binary extraction and memory analysis, including detecting code injections and strings.
Command line tool for testing CRLF injection on a list of domains.
BARF is an open source binary analysis framework for supporting various binary code analysis tasks in information security.
Kaitai Struct is a declarative language for describing binary data structures.