Python interface for the SEGGER J-Link.You can copy the JLinkARM.dll to any of the directories listed above. Alternatively, add the SEGGER J-Link directory to your %PATH%.
http://pylink.readthedocs.io/en/latest/Tags | arm debugging firmware |
Implementation | Python |
License | Apache |
Platform | Windows Linux |
This is a keyboard firmware based on the tmk_keyboard firmware with some useful features for Atmel AVR and ARM controllers, and more specifically, the OLKB product line, the ErgoDox EZ keyboard, and the Clueboard product line. The docs are hosted on Gitbook and GitHub (they are synced). You can request changes by making a fork and pull request, or by clicking the "suggest an edit" link on any page of the docs.
keyboard-firmware olkb ergodox-ez clueboardWhere possible, the code is designed for reuse or porting to other Armv7-A and Armv8-A model and hardware platforms. Arm will continue development in collaboration with interested parties to provide a full reference implementation of Secure Monitor code and Arm standards to the benefit of all developers working with Armv7-A and Armv8-A TrustZone technology.
The libopencm3 project aims to create an open-source firmware library for various ARM Cortex-M microcontrollers. The library is written completely from scratch based on the vendor datasheets, programming manuals, and application notes. The code is meant to be used with a GCC toolchain for ARM (arm-elf or arm-none-eabi), flashing of the code to a microcontroller can be done using the OpenOCD ARM JTAG software.
This is the repository that contains the CAD files, the STL files, the user manual (with the assembly manual), the firmware, and the Bill of Materials of the BCN3D Moveo. BCN3D Technologies keeps taking important steps in order to achieve his goal of bringing the digital manufacturing technology to everyone. In this occasion we are presenting the BCN3D Moveo, a robotic arm design from scratch and developed by our engineers in collaboration with the Departament d’Ensenyament from the Generalitat de Catalunya. Its structure is fully printed using additive manufacturing technologies and its electronics are controlled by the software Arduino. Moveo, fully functional nowadays, has been born, as all the BCN3D Technologies products, with an open and educational wish. One of the Departament d’Ensenyament worries is the high price of the materials the grade students must use on their internships. Holding that in mind, an Open Source robotic arm, adaptable by the students and low cost reproducible could take several educational itineraries: mechanical design, automatism, industrial programing, etc. Thus, the BCN3D Moveo should allow the educational centers to enjoy a modifiable and easily accessible for the students, at a price far lower than the usual industrial equipment they used to have to acquire, with enough output for training purposes. As a Fundació CIM area, BCN3D Technologies shares its educational vocation. That is the reason why when the Departament d’Ensenyament contacted us in order to suggest and offer this project a year ago we didn’t hesitate on taking that opportunity. Once we had the robotic arm designed and manufactured we started the last phase of the project, which consisted on an assembling and fine tuning workshop for 15 institutes around Catalonia, which took place in the BCN3D Technologies. These institutes already have the BCN3D Moveo in their classrooms and workshops, and will have to present an internship program that proves their knowledge about the arm during September.
Firmware, Schematics, and Mechanicals for the Oculus Rift Development Kit 1. The Tracker firmware uses the CooCox CoIDE for development along with the gcc-arm-embedded toolchain.
WDBGARK is an extension (dynamic library) for the Microsoft Debugging Tools for Windows. It main purpose is to view and analyze anomalies in Windows kernel using kernel debugger. It is possible to view various system callbacks, system tables, object types and so on. For more user-friendly view extension uses DML. For the most of commands kernel-mode connection is required. Feel free to use extension with live kernel-mode debugging or with kernel-mode crash dump analysis (some commands will not work). Public symbols are required, so use them, force to reload them, ignore checksum problems, prepare them before analysis and you'll be happy. Windows BETA/RC is supported by design, but read a few notes. First, i don't care about checked builds. Second, i don't care if you don't have symbols (public or private). IA64/ARM is unsupported (and will not).
kernel-mode c-plus-plus malware malware-analysis malware-research forensic-analysis windbg windbg-extension anti-rootkit visual-studio driver wdbgark memory-forensics anomaly-detection user-mode sww debugging-tool swwwolf crash-dumpOfficial PlatformIO IDE for IoT, Arduino, ARM mbed, Espressif (ESP8266/ESP32), STM32, PIC32, nRF51/nRF52, FPGA, CMSIS, SPL, AVR, Samsung ARTIK, libOpenCM3
arduino iot atom build esp32 esp8266 libraries embedded ide platformio verilog fpga lattice hardware mbed microcontroller debugger unittest flash firmware avr arm serial monitorPlatformIO is an open source ecosystem for IoT development. Cross-platform IDE and unified debugger. Remote unit testing and firmware updates. See contributing guidelines.
iot embedded arduino mbed esp8266 esp32 fpga firmware continuous-integration cloud-ide avr arm platformio ide unit-testing hardware verilog microcontroller debugME Analyzer is a tool which parses Intel Engine & PMC firmware images from the (Converged Security) Management Engine, (Converged Security) Trusted Execution Engine, (Converged Security) Server Platform Services & Power Management Controller families. It can be used by end-users who are looking for all relevant firmware information such as Family, Version, Release, Type, Date, SKU, Platform etc. It is capable of detecting new/unknown firmware, checking firmware health, Updated/Outdated status and many more. ME Analyzer is also a powerful Engine firmware research analysis tool with multiple structures which allow, among others, full parsing and unpacking of Converged Security Engine (CSE) code & file system, Flash Partition Table (FPT), Boot Partition Descriptor Table (BPDT/IFWI), CSE Layout Table (LT), advanced Size detection etc. Moreover, with the help of its extensive database, ME Analyzer is capable of uniquely categorizing all supported Engine firmware as well as check for any firmware which have not been stored at the Intel Engine Firmware Repositories yet. ME Analyzer allows end-users and/or researchers to quickly analyze and/or report new firmware versions without the use of special Intel tools (FIT/FITC, FWUpdate) or Hex Editors. To do that effectively, a database had to be built. The Intel Engine Firmware Repositories is a collection of every (CS)ME, (CS)TXE & (CS)SPS firmware we have found. Its existence is very important for ME Analyzer as it allows us to continue doing research, find new types of firmware, compare same major version releases for similarities, check for updated firmware etc. Bundled with ME Analyzer is a file called MEA.dat which is required for the program to run. It includes entries for all Engine firmware that are available to us. This accommodates primarily three actions: a) Detect each firmware's Family via unique identifier keys, b) Check whether the imported firmware is up to date and c) Help find new Engine firmware sooner by reporting them at the Intel Management Engine: Drivers, Firmware & System Tools or Intel Trusted Execution Engine: Drivers, Firmware & System Tools threads respectively.
licut is a lightweight suite of software tools for sending Inkscape SVG files to a Cricut cutting device. Currently tested with Cricut Cake running firmware v2.35, running on Ubuntu 9.04 and cross-compiled for arm-linux on Chumby
A free/libre/open-source firmware library (previously known as libopenstm32) for various ARM Cortex-M3 microcontrollers, including ST STM32, Toshiba TX03, Atmel SAM3U, NXP LPC1000 and others. Sourcecode and bugtracker can be found at http://github.com/libopencm3
ARMboot is an Open-Source firmware suite for ARM based platforms. ARMboot is heavily based on the sister-project PPCboot, which provides similar functionality on PowerPC based systems. ARMboot shall be a common, easy-to-use and easy-to-port boot platform
This repository contains assorted example projects for libopencm3. The libopencm3 project aims to create an open-source firmware library for various ARM Cortex-M microcontrollers.
This code works with the PRU units on the Beagle Bone and can easily cause hard crashes. It is still being debugged and developed. Be careful hot-plugging things into the headers -- it is possible to damage the pin drivers and cause problems in the ARM, especially if there are +5V signals involved. The WS281x LED chips are built like shift registers and make for very easy LED strip construction. The signals are duty-cycle modulated, with a 0 measuring 250 ns long and a 1 being 600 ns long, and 1250 ns between bits. Since this doesn't map to normal SPI hardware and requires an 800 KHz bit clock, it is typically handled with a dedicated microcontroller or DMA hardware on something like the Teensy 3.
Hijacker is a Graphical User Interface for the penetration testing tools Aircrack-ng, Airodump-ng, MDK3 and Reaver. It offers a simple and easy UI to use these tools without typing commands in a console and copy&pasting MAC addresses. This application requires an ARM android device with an internal wireless adapter that supports Monitor Mode. A few android devices do, but none of them natively. This means that you will need a custom firmware. Any device that uses the BCM4339 chipset (MSM8974, such as Nexus 5, Xperia Z1/Z2, LG G2, LG G Flex, Samsung Galaxy Note 3) will work with Nexmon (which also supports some other chipsets). Devices that use BCM4330 can use bcmon.
android aircrack airodump-ng monitor-mode wireless reaver wpa crackGDB patch for debugging embedded ARM system via JTAG debug interface. The embedded and extended Python interpreter make OS-aware debug session possible, and also provide flexible NOR/NAND flash utility.
GDB Remote Stub Backend for debugging an embedded ARM system via JTAG common hardware debug interface. Communication is done via standard TCP/IP GDB Remote Serial Protocol.
GEF is a kick-ass set of commands for X86, ARM, MIPS, PowerPC and SPARC to make GDB cool again for exploit dev. It is aimed to be used mostly by exploiters and reverse-engineers, to provide additional features to GDB using the Python API to assist during the process of dynamic analysis and exploit development. It has full support for both Python2 and Python3 indifferently (as more and more distros start pushing gdb compiled with Python3 support).
exploit gdb reverse-engineering ctf ida-pro binary-ninja pwn exploit-development malware malware-research debuggingRun one command, get a QEMU or gem5 Buildroot BusyBox virtual machine built from source with several minimal Linux kernel 4.16 module development example tutorials with GDB and KGDB step debugging and minimal educational hardware models. "Tested" in x86, ARM and MIPS guests, Ubuntu 18.04 host. This is the most native setup, and therefore the best one if you are on one of the supported Ubuntu: 16.04 or 18.04.
buildroot linux-kernel qemu gdb kgdb linux-kernel-moduleLuma3DS is a program to patch the system software of (New) Nintendo 3DS handheld consoles "on the fly", adding features (such as per-game language settings and debugging capabilities for developers) and removing restrictions enforced by Nintendo (such as the region lock). It also allows you to run unauthorized ("homebrew") content by removing signature checks. To use it, you will need a console capable of running homebrew software on the ARM9 processor. We recommend Plailect's guide for details on how to get your system ready. Since Luma3DS v8.0, Luma3DS has its own in-game menu, triggerable by L+Down+Select (see the release notes).
We have large collection of open source products. Follow the tags from
Tag Cloud >>
Open source products are scattered around the web. Please provide information
about the open source projects you own / you use.
Add Projects.