basefind2
allyourbase
basefind2 | allyourbase | |
---|---|---|
2 | 1 | |
39 | 33 | |
- | - | |
2.7 | 4.0 | |
about 2 years ago | about 1 year ago | |
Python | Python | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
basefind2
-
MIPS Firmware Reverse Engineering - anyone having any success using Ghidra for this?
Your best bet here is to get the base address nailed down (assuming it’s a flat/monolithic image). There are a handful of utilities floating around (binbloom, basefind2) that use various pointer heuristics to try to guess the base address. There’s also a nice trick detailed in PoC||GTFO that you can use pretty reliably.
- A faster base address scanner.
allyourbase
What are some alternatives?
vmlinux-to-elf - A tool to recover a fully analyzable .ELF from a raw kernel, through extracting the kernel symbol table (kallsyms)
FACT_core - Firmware Analysis and Comparison Tool
pwndbg - Exploit Development and Reverse Engineering with GDB Made Easy
binbloom - Raw binary firmware analysis software
gef - GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
owasp-mastg - The Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the controls listed in the OWASP Mobile Application Security Verification Standard (MASVS).
androguard - Reverse engineering and pentesting for Android applications
embark - EMBArk - The firmware security scanning environment
ghidra - Ghidra is a software reverse engineering (SRE) framework