maxwell-bland
Security Researcher. Emails: mbland [at] motorola.com bland [at] sdf.org
MotorolaChicago, Illinois
maxwell-bland's Stars
ChrisTheCoolHut/Firmware_Slap
Discovering vulnerabilities in firmware through concolic analysis and function clustering.
falconre/falcon
Binary Analysis Framework in Rust
ucsb-seclab/karonte
Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware
nyx-fuzz/QEMU-Nyx
fuzzware-fuzzer/fuzzware
Fuzzware's main repository. Start here to install.
IntelLabs/kAFL
A fuzzer for full VM kernel/driver targets
binsec/binsec
BINSEC binary-level open-source platform
rjkroege/edwood
Go version of Plan9 Acme Editor
Nalen98/AngryGhidra
Use angr in Ghidra
sgayou/rbasefind
A firmware base address search tool.
BillHallahan/G2
aerosec/jetset
astrelsky/Ghidra-Cpp-Class-Analyzer
Ghidra C++ Class and Run Time Type Information Analyzer
zyedidia/sregx
A tool and library for using structural regular expressions.
9fans/plan9port
Plan 9 from User Space
martanne/vis
A vi-like editor based on Plan 9's structural regular expressions
radareorg/esilsolve
A python symbolic execution framework using radare2's ESIL (Evaluable String Intermediate Language)
NationalSecurityAgency/ghidra
Ghidra is a software reverse engineering (SRE) framework
NationalSecurityAgency/ghidra-data
Supporting Data Archives for Ghidra
NationalSecurityAgency/XORSATFilter
A library for building efficient set-membership filters and dictionaries based on the Satisfiability problem.
vivisect/vivisect
zhuyifei1999/guppy3
guppy / heapy ported to Python3. It works for real!
andreafioraldi/angrgdb
Use angr inside GDB. Create an angr state from the current debugger state.