pylink - Python Library for device debugging/programming via J-Link

  •        198

Python interface for the SEGGER J-Link.You can copy the JLinkARM.dll to any of the directories listed above. Alternatively, add the SEGGER J-Link directory to your %PATH%.

http://pylink.readthedocs.io/en/latest/
https://github.com/square/pylink

Tags
Implementation
License
Platform

   




Related Projects

qmk_firmware - keyboard controller firmware for Atmel AVR and ARM USB families

  •    C

This is a keyboard firmware based on the tmk_keyboard firmware with some useful features for Atmel AVR and ARM controllers, and more specifically, the OLKB product line, the ErgoDox EZ keyboard, and the Clueboard product line. The docs are hosted on Gitbook and GitHub (they are synced). You can request changes by making a fork and pull request, or by clicking the "suggest an edit" link on any page of the docs.

arm-trusted-firmware - Trusted Firmware-A

  •    C

Where possible, the code is designed for reuse or porting to other Armv7-A and Armv8-A model and hardware platforms. Arm will continue development in collaboration with interested parties to provide a full reference implementation of Secure Monitor code and Arm standards to the benefit of all developers working with Armv7-A and Armv8-A TrustZone technology.

libopencm3 - Open Source ARM cortex m microcontroller library

  •    C

The libopencm3 project aims to create an open-source firmware library for various ARM Cortex-M microcontrollers. The library is written completely from scratch based on the vendor datasheets, programming manuals, and application notes. The code is meant to be used with a GCC toolchain for ARM (arm-elf or arm-none-eabi), flashing of the code to a microcontroller can be done using the OpenOCD ARM JTAG software.

BCN3D-Moveo - Open Source 3D Printed Robotic Arm for educational purposes

  •    C++

This is the repository that contains the CAD files, the STL files, the user manual (with the assembly manual), the firmware, and the Bill of Materials of the BCN3D Moveo. BCN3D Technologies keeps taking important steps in order to achieve his goal of bringing the digital manufacturing technology to everyone. In this occasion we are presenting the BCN3D Moveo, a robotic arm design from scratch and developed by our engineers in collaboration with the Departament d’Ensenyament from the Generalitat de Catalunya. Its structure is fully printed using additive manufacturing technologies and its electronics are controlled by the software Arduino. Moveo, fully functional nowadays, has been born, as all the BCN3D Technologies products, with an open and educational wish. One of the Departament d’Ensenyament worries is the high price of the materials the grade students must use on their internships. Holding that in mind, an Open Source robotic arm, adaptable by the students and low cost reproducible could take several educational itineraries: mechanical design, automatism, industrial programing, etc. Thus, the BCN3D Moveo should allow the educational centers to enjoy a modifiable and easily accessible for the students, at a price far lower than the usual industrial equipment they used to have to acquire, with enough output for training purposes. As a Fundació CIM area, BCN3D Technologies shares its educational vocation. That is the reason why when the Departament d’Ensenyament contacted us in order to suggest and offer this project a year ago we didn’t hesitate on taking that opportunity. Once we had the robotic arm designed and manufactured we started the last phase of the project, which consisted on an assembling and fine tuning workshop for 15 institutes around Catalonia, which took place in the BCN3D Technologies. These institutes already have the BCN3D Moveo in their classrooms and workshops, and will have to present an internship program that proves their knowledge about the arm during September.

RiftDK1 - Firmware, Schematics, and Mechanicals for the Oculus Rift Development Kit 1

  •    C

Firmware, Schematics, and Mechanicals for the Oculus Rift Development Kit 1. The Tracker firmware uses the CooCox CoIDE for development along with the gcc-arm-embedded toolchain.


wdbgark - WinDBG Anti-RootKit Extension

  •    C++

WDBGARK is an extension (dynamic library) for the Microsoft Debugging Tools for Windows. It main purpose is to view and analyze anomalies in Windows kernel using kernel debugger. It is possible to view various system callbacks, system tables, object types and so on. For more user-friendly view extension uses DML. For the most of commands kernel-mode connection is required. Feel free to use extension with live kernel-mode debugging or with kernel-mode crash dump analysis (some commands will not work). Public symbols are required, so use them, force to reload them, ignore checksum problems, prepare them before analysis and you'll be happy. Windows BETA/RC is supported by design, but read a few notes. First, i don't care about checked builds. Second, i don't care if you don't have symbols (public or private). IA64/ARM is unsupported (and will not).

MEAnalyzer - Intel Engine Firmware Analysis Tool

  •    Python

ME Analyzer is a tool which parses Intel Engine & PMC firmware images from the (Converged Security) Management Engine, (Converged Security) Trusted Execution Engine, (Converged Security) Server Platform Services & Power Management Controller families. It can be used by end-users who are looking for all relevant firmware information such as Family, Version, Release, Type, Date, SKU, Platform etc. It is capable of detecting new/unknown firmware, checking firmware health, Updated/Outdated status and many more. ME Analyzer is also a powerful Engine firmware research analysis tool with multiple structures which allow, among others, full parsing and unpacking of Converged Security Engine (CSE) code & file system, Flash Partition Table (FPT), Boot Partition Descriptor Table (BPDT/IFWI), CSE Layout Table (LT), advanced Size detection etc. Moreover, with the help of its extensive database, ME Analyzer is capable of uniquely categorizing all supported Engine firmware as well as check for any firmware which have not been stored at the Intel Engine Firmware Repositories yet. ME Analyzer allows end-users and/or researchers to quickly analyze and/or report new firmware versions without the use of special Intel tools (FIT/FITC, FWUpdate) or Hex Editors. To do that effectively, a database had to be built. The Intel Engine Firmware Repositories is a collection of every (CS)ME, (CS)TXE & (CS)SPS firmware we have found. Its existence is very important for ME Analyzer as it allows us to continue doing research, find new types of firmware, compare same major version releases for similarities, check for updated firmware etc. Bundled with ME Analyzer is a file called MEA.dat which is required for the program to run. It includes entries for all Engine firmware that are available to us. This accommodates primarily three actions: a) Detect each firmware's Family via unique identifier keys, b) Check whether the imported firmware is up to date and c) Help find new Engine firmware sooner by reporting them at the Intel Management Engine: Drivers, Firmware & System Tools or Intel Trusted Execution Engine: Drivers, Firmware & System Tools threads respectively.

licut

  •    C++

licut is a lightweight suite of software tools for sending Inkscape SVG files to a Cricut cutting device. Currently tested with Cricut Cake running firmware v2.35, running on Ubuntu 9.04 and cross-compiled for arm-linux on Chumby

libopencm3

  •    C

A free/libre/open-source firmware library (previously known as libopenstm32) for various ARM Cortex-M3 microcontrollers, including ST STM32, Toshiba TX03, Atmel SAM3U, NXP LPC1000 and others. Sourcecode and bugtracker can be found at http://github.com/libopencm3

ARMboot

  •    C

ARMboot is an Open-Source firmware suite for ARM based platforms. ARMboot is heavily based on the sister-project PPCboot, which provides similar functionality on PowerPC based systems. ARMboot shall be a common, easy-to-use and easy-to-port boot platform

libopencm3-examples - Simple example projects showing how to use libopencm3.

  •    Makefile

This repository contains assorted example projects for libopencm3. The libopencm3 project aims to create an open-source firmware library for various ARM Cortex-M microcontrollers.

LEDscape - Beagle Bone Black cape and firmware for driving a large number of WS281x LED strips.

  •    C

This code works with the PRU units on the Beagle Bone and can easily cause hard crashes. It is still being debugged and developed. Be careful hot-plugging things into the headers -- it is possible to damage the pin drivers and cause problems in the ARM, especially if there are +5V signals involved. The WS281x LED chips are built like shift registers and make for very easy LED strip construction. The signals are duty-cycle modulated, with a 0 measuring 250 ns long and a 1 being 600 ns long, and 1250 ns between bits. Since this doesn't map to normal SPI hardware and requires an 800 KHz bit clock, it is typically handled with a dedicated microcontroller or DMA hardware on something like the Teensy 3.

Hijacker - Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Android

  •    Java

Hijacker is a Graphical User Interface for the penetration testing tools Aircrack-ng, Airodump-ng, MDK3 and Reaver. It offers a simple and easy UI to use these tools without typing commands in a console and copy&pasting MAC addresses. This application requires an ARM android device with an internal wireless adapter that supports Monitor Mode. A few android devices do, but none of them natively. This means that you will need a custom firmware. Any device that uses the BCM4339 chipset (MSM8974, such as Nexus 5, Xperia Z1/Z2, LG G2, LG G Flex, Samsung Galaxy Note 3) will work with Nexmon (which also supports some other chipsets). Devices that use BCM4330 can use bcmon.

gdb-ocd

  •    C

GDB patch for debugging embedded ARM system via JTAG debug interface. The embedded and extended Python interpreter make OS-aware debug session possible, and also provide flexible NOR/NAND flash utility.

GDB Stub for ARMs JTAG interface

  •    

GDB Remote Stub Backend for debugging an embedded ARM system via JTAG common hardware debug interface. Communication is done via standard TCP/IP GDB Remote Serial Protocol.

gef - GEF - GDB Enhanced Features for exploit devs & reversers

  •    Python

GEF is a kick-ass set of commands for X86, ARM, MIPS, PowerPC and SPARC to make GDB cool again for exploit dev. It is aimed to be used mostly by exploiters and reverse-engineers, to provide additional features to GDB using the Python API to assist during the process of dynamic analysis and exploit development. It has full support for both Python2 and Python3 indifferently (as more and more distros start pushing gdb compiled with Python3 support).

linux-kernel-module-cheat - Run one command, get a QEMU or gem5 Buildroot BusyBox virtual machine built from source with several minimal Linux kernel 4

  •    C

Run one command, get a QEMU or gem5 Buildroot BusyBox virtual machine built from source with several minimal Linux kernel 4.16 module development example tutorials with GDB and KGDB step debugging and minimal educational hardware models. "Tested" in x86, ARM and MIPS guests, Ubuntu 18.04 host. This is the most native setup, and therefore the best one if you are on one of the supported Ubuntu: 16.04 or 18.04.

Luma3DS - Noob-proof (N)3DS "Custom Firmware"

  •    C

Luma3DS is a program to patch the system software of (New) Nintendo 3DS handheld consoles "on the fly", adding features (such as per-game language settings and debugging capabilities for developers) and removing restrictions enforced by Nintendo (such as the region lock). It also allows you to run unauthorized ("homebrew") content by removing signature checks. To use it, you will need a console capable of running homebrew software on the ARM9 processor. We recommend Plailect's guide for details on how to get your system ready. Since Luma3DS v8.0, Luma3DS has its own in-game menu, triggerable by L+Down+Select (see the release notes).