Update ESP32 + HydraBus
parent
f75c2c7018
commit
f9f650dea3
|
@ -139,7 +139,7 @@ $ simulavr -P atmega128 -F 16000000 –f build-crumbuino128/ex1.1.elf
|
||||||
|
|
||||||
Parse BIOS/Intel ME/UEFI firmware related structures: Volumes, FileSystems, Files, etc - [theopolis/uefi-firmware-parser](https://github.com/theopolis/uefi-firmware-parser)
|
Parse BIOS/Intel ME/UEFI firmware related structures: Volumes, FileSystems, Files, etc - [theopolis/uefi-firmware-parser](https://github.com/theopolis/uefi-firmware-parser)
|
||||||
|
|
||||||
```
|
```ps1
|
||||||
sudo pip install uefi_firmware
|
sudo pip install uefi_firmware
|
||||||
$ uefi-firmware-parser --test ~/firmware/*
|
$ uefi-firmware-parser --test ~/firmware/*
|
||||||
~/firmware/970E32_1.40: UEFIFirmwareVolume
|
~/firmware/970E32_1.40: UEFIFirmwareVolume
|
||||||
|
@ -152,6 +152,7 @@ $ uefi-firmware-parser --test ~/firmware/*
|
||||||
|
|
||||||
## References
|
## References
|
||||||
|
|
||||||
|
* [GreHack22 - SecureDUO - chrisrdlg](https://github.com/chrisrdlg/gh22_SecureDuo)
|
||||||
* [Loader un binaire Arduino dans IDA - Posted on January 26, 2014 by thanatos](https://thanat0s.trollprod.org/2014/01/loader-un-binaire-arduino-dans-ida/)
|
* [Loader un binaire Arduino dans IDA - Posted on January 26, 2014 by thanatos](https://thanat0s.trollprod.org/2014/01/loader-un-binaire-arduino-dans-ida/)
|
||||||
* [REcon 2014 - Reverse Engineering Flash Memory For Fun and Benefit - Matt Oh](https://youtu.be/nTPfKT61730)
|
* [REcon 2014 - Reverse Engineering Flash Memory For Fun and Benefit - Matt Oh](https://youtu.be/nTPfKT61730)
|
||||||
* [Reverse Engineering Flash Memory for Fun and Benefit - Jeong Wook (Matt) Oh](https://www.blackhat.com/docs/us-14/materials/us-14-Oh-Reverse-Engineering-Flash-Memory-For-Fun-And-Benefit-WP.pdf)
|
* [Reverse Engineering Flash Memory for Fun and Benefit - Jeong Wook (Matt) Oh](https://www.blackhat.com/docs/us-14/materials/us-14-Oh-Reverse-Engineering-Flash-Memory-For-Fun-And-Benefit-WP.pdf)
|
|
@ -10,6 +10,13 @@
|
||||||
* [scientifichackers/ampy](https://github.com/scientifichackers/ampy) - Utility to interact with a MicroPython board over a serial connection
|
* [scientifichackers/ampy](https://github.com/scientifichackers/ampy) - Utility to interact with a MicroPython board over a serial connection
|
||||||
* [ESPWebTool](https://esp.huhn.me/) - Flash your ESP32 or ESP8266 through your browser.
|
* [ESPWebTool](https://esp.huhn.me/) - Flash your ESP32 or ESP8266 through your browser.
|
||||||
|
|
||||||
|
|
||||||
|
## Firmwares
|
||||||
|
|
||||||
|
* [risinek/esp32-wifi-penetration-tool](https://github.com/risinek/esp32-wifi-penetration-tool) - Exploring possibilities of ESP32 platform to attack on nearby Wi-Fi networks.
|
||||||
|
* [justcallmekoko/ESP32Marauder](https://github.com/justcallmekoko/ESP32Marauder) - A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32
|
||||||
|
|
||||||
|
|
||||||
## Flashing
|
## Flashing
|
||||||
|
|
||||||
The ESP32 microprocessor uses the Xtensa instruction set, use `Tensilica Xtensa 32-bit little-endian` in Ghidra.
|
The ESP32 microprocessor uses the Xtensa instruction set, use `Tensilica Xtensa 32-bit little-endian` in Ghidra.
|
||||||
|
|
|
@ -7,9 +7,9 @@
|
||||||
|
|
||||||
Support many extensions:
|
Support many extensions:
|
||||||
|
|
||||||
- [HydraNFC](https://swisskyrepo.github.io/HardwareAllTheThings/gadgets/hydranfc/)
|
- [HydraNFC](https://swisskyrepo.github.io/HardwareAllTheThings/gadgets/hydranfc/) - Hydrabus shield for NFC
|
||||||
- [HydraFlash](https://swisskyrepo.github.io/HardwareAllTheThings/gadgets/hydraflash/)
|
- [HydraFlash](https://swisskyrepo.github.io/HardwareAllTheThings/gadgets/hydraflash/) - NAND flash shield
|
||||||
- HydraLINCAN
|
- [HydraLINCAN](https://github.com/smillier/HydraLINCAN) - Hydrabus shield for LIN and CAN buses
|
||||||
|
|
||||||
External interactions:
|
External interactions:
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue