diff --git a/docs/firmware/firmware-reverse-engineering.md b/docs/firmware/firmware-reverse-engineering.md index 10fb0ab..4165d4b 100644 --- a/docs/firmware/firmware-reverse-engineering.md +++ b/docs/firmware/firmware-reverse-engineering.md @@ -139,7 +139,7 @@ $ simulavr -P atmega128 -F 16000000 –f build-crumbuino128/ex1.1.elf Parse BIOS/Intel ME/UEFI firmware related structures: Volumes, FileSystems, Files, etc - [theopolis/uefi-firmware-parser](https://github.com/theopolis/uefi-firmware-parser) -``` +```ps1 sudo pip install uefi_firmware $ uefi-firmware-parser --test ~/firmware/* ~/firmware/970E32_1.40: UEFIFirmwareVolume @@ -152,6 +152,7 @@ $ uefi-firmware-parser --test ~/firmware/* ## References +* [GreHack22 - SecureDUO - chrisrdlg](https://github.com/chrisrdlg/gh22_SecureDuo) * [Loader un binaire Arduino dans IDA - Posted on January 26, 2014 by thanatos](https://thanat0s.trollprod.org/2014/01/loader-un-binaire-arduino-dans-ida/) * [REcon 2014 - Reverse Engineering Flash Memory For Fun and Benefit - Matt Oh](https://youtu.be/nTPfKT61730) * [Reverse Engineering Flash Memory for Fun and Benefit - Jeong Wook (Matt) Oh](https://www.blackhat.com/docs/us-14/materials/us-14-Oh-Reverse-Engineering-Flash-Memory-For-Fun-And-Benefit-WP.pdf) \ No newline at end of file diff --git a/docs/gadgets/esp32.md b/docs/gadgets/esp32.md index aa139d9..1a308e9 100644 --- a/docs/gadgets/esp32.md +++ b/docs/gadgets/esp32.md @@ -10,6 +10,13 @@ * [scientifichackers/ampy](https://github.com/scientifichackers/ampy) - Utility to interact with a MicroPython board over a serial connection * [ESPWebTool](https://esp.huhn.me/) - Flash your ESP32 or ESP8266 through your browser. + +## Firmwares + +* [risinek/esp32-wifi-penetration-tool](https://github.com/risinek/esp32-wifi-penetration-tool) - Exploring possibilities of ESP32 platform to attack on nearby Wi-Fi networks. +* [justcallmekoko/ESP32Marauder](https://github.com/justcallmekoko/ESP32Marauder) - A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32 + + ## Flashing The ESP32 microprocessor uses the Xtensa instruction set, use `Tensilica Xtensa 32-bit little-endian` in Ghidra. diff --git a/docs/gadgets/hydrabus.md b/docs/gadgets/hydrabus.md index 7b887d7..3d950f9 100644 --- a/docs/gadgets/hydrabus.md +++ b/docs/gadgets/hydrabus.md @@ -7,9 +7,9 @@ Support many extensions: -- [HydraNFC](https://swisskyrepo.github.io/HardwareAllTheThings/gadgets/hydranfc/) -- [HydraFlash](https://swisskyrepo.github.io/HardwareAllTheThings/gadgets/hydraflash/) -- HydraLINCAN +- [HydraNFC](https://swisskyrepo.github.io/HardwareAllTheThings/gadgets/hydranfc/) - Hydrabus shield for NFC +- [HydraFlash](https://swisskyrepo.github.io/HardwareAllTheThings/gadgets/hydraflash/) - NAND flash shield +- [HydraLINCAN](https://github.com/smillier/HydraLINCAN) - Hydrabus shield for LIN and CAN buses External interactions: