Pinned Repositories
android_emuroot
Android_Emuroot is a Python script that allows granting root privileges on the fly to shells running on Android virtual machines that use google-provided emulator images called Google API Playstore, to help reverse engineers to go deeper into their investigations.
bincat
Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free detection
cpu_rec
Recognize cpu instructions in an arbitrary binary file
crashos
A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.
diffware
An extensively configurable tool providing a summary of the changes between two files or directories, ignoring all the fluff you don't care about.
gustave
GUSTAVE is a fuzzing platform for embedded OS kernels. It is based on QEMU and AFL (and all of its forkserver siblings). It allows to fuzz OS kernels like simple applications.
ilo4_toolbox
Toolbox for HPE iLO4 & iLO5 analysis
powersap
Powershell SAP assessment tool
qemu_blog
A series of posts about QEMU internals:
warbirdvm
An analysis of the Warbird virtual-machine protection for the CI!g_pStore
airbus-seclab's Repositories
airbus-seclab/bincat
Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free detection
airbus-seclab/qemu_blog
A series of posts about QEMU internals:
airbus-seclab/cpu_rec
Recognize cpu instructions in an arbitrary binary file
airbus-seclab/ilo4_toolbox
Toolbox for HPE iLO4 & iLO5 analysis
airbus-seclab/warbirdvm
An analysis of the Warbird virtual-machine protection for the CI!g_pStore
airbus-seclab/diffware
An extensively configurable tool providing a summary of the changes between two files or directories, ignoring all the fluff you don't care about.
airbus-seclab/gustave
GUSTAVE is a fuzzing platform for embedded OS kernels. It is based on QEMU and AFL (and all of its forkserver siblings). It allows to fuzz OS kernels like simple applications.
airbus-seclab/powersap
Powershell SAP assessment tool
airbus-seclab/c-compiler-security
Security-related flags and options for C compilers
airbus-seclab/crashos
A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.
airbus-seclab/ramooflax
a bare metal (type 1) VMM (hypervisor) with a python remote control API
airbus-seclab/bta
Open source Active Directory security audit framework.
airbus-seclab/android_emuroot
Android_Emuroot is a Python script that allows granting root privileges on the fly to shells running on Android virtual machines that use google-provided emulator images called Google API Playstore, to help reverse engineers to go deeper into their investigations.
airbus-seclab/AutoResolv
airbus-seclab/AFLplusplus-blogpost
Blogpost about optimizing binary-only fuzzing with AFL++
airbus-seclab/elfesteem
ELF/PE/Mach-O parsing library
airbus-seclab/GEA1_break
Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)
airbus-seclab/airbus-seclab.github.io
Conferences, tools, papers, etc.
airbus-seclab/nbutools
Tools for offensive security of NetBackup infrastructures
airbus-seclab/sdmmc-analyzer
SD/MMC Analyzer for Saleae Logic
airbus-seclab/rebus
REbus facilitates the coupling of existing tools that perform specific tasks, where one's output will be used as the input of others.
airbus-seclab/usbq_core
USB man in the middle linux kernel driver
airbus-seclab/gunpack
Generic unpacker (dynamic)
airbus-seclab/qemu
Airbus seclab fork of qemu
airbus-seclab/cpu_doc
Curated set of documents about CPU
airbus-seclab/pwnvasive
semi-automatic discovery and lateralization
airbus-seclab/afl
Airbus seclab fork of AFL
airbus-seclab/pok
forked from pok-kernel/pok
airbus-seclab/apps-script
airbus-seclab/amoco
yet another tool for analysing binaries