PRINT
PRINT
SEND MAIL
SEND MAIL

Polypyus – Learns To Locate Functions In Raw Binaries By Extracting Known Functions From Similar Binaries

Polypyus learns to locate functions in raw binaries by extracting known functions from similar binaries. Thus, it is a firmware historian. Polypyus works without disassembling these binaries, which is an advantage for binaries that are complex to d...

Continue reading

UEFI_RETool – A Tool For UEFI Firmware Reverse Engineering

A tool for UEFI firmware reverse engineering.UEFI firmware analysis with uefi_retool.py scriptUsage:Copy ida_plugin/uefi_analyser.py script and ida_plugin/uefi_analyser directory to IDA plugins directoryEdit config.json file PE_DIR is a directory that...

Continue reading

Karonte – A Static Analysis Tool To Detect Multi-Binary Vulnerabilities In Embedded Firmware

Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware.Research paperWe present our approach and the findings of this work in the following research paper:KARONTE: Detecting Insecure Multi-binary Interactions in E...

Continue reading

Firmware Analysis Toolkit – Toolkit To Emulate Firmware And Analyse It For Security Vulnerabilities

FAT is a toolkit built in order to help security researchers analyze and identify vulnerabilities in IoT and embedded device firmware. This is built in order to use for the "Offensive IoT Exploitation" training conducted by Attify.Download AttifyOSNote...

Continue reading

Btlejack – Bluetooth Low Energy Swiss-army Knife

Btlejack provides everything you need to sniff, jam and hijack Bluetooth Low Energy devices. It relies on one or more BBC Micro:Bit. devices running a dedicated firmware. You may also want to use an Adafruit's Bluefruit LE sniffer or a nRF51822 Eval K...

Continue reading

©2021 By Cyber Sec Labs

   

CONTACT US

We're not around right now. But you can send us an email and we'll get back to you, asap.

Sending

Log in with your credentials

or    

Forgot your details?

Create Account