{"id":13845348,"url":"https://github.com/FirmWire/FirmWire","last_synced_at":"2025-07-12T02:30:43.946Z","repository":{"id":42513964,"uuid":"447002181","full_name":"FirmWire/FirmWire","owner":"FirmWire","description":"FirmWire is a full-system baseband firmware emulation platform for fuzzing, debugging, and root-cause analysis of smartphone baseband firmwares","archived":false,"fork":false,"pushed_at":"2024-10-29T10:29:12.000Z","size":1503,"stargazers_count":766,"open_issues_count":16,"forks_count":80,"subscribers_count":41,"default_branch":"main","last_synced_at":"2024-11-21T18:39:46.132Z","etag":null,"topics":["baseband","emulation","fuzzing","introspection","mediatek","qemu","samsung"],"latest_commit_sha":null,"homepage":"https://firmwire.github.io/docs/","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"bsd-3-clause","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/FirmWire.png","metadata":{"files":{"readme":"README.md","changelog":"CHANGELOG.md","contributing":null,"funding":null,"license":"LICENSE.txt","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2022-01-11T22:35:18.000Z","updated_at":"2024-11-18T09:05:30.000Z","dependencies_parsed_at":"2024-10-28T22:37:33.645Z","dependency_job_id":null,"html_url":"https://github.com/FirmWire/FirmWire","commit_stats":null,"previous_names":[],"tags_count":2,"template":false,"template_full_name":null,"purl":"pkg:github/FirmWire/FirmWire","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/FirmWire%2FFirmWire","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/FirmWire%2FFirmWire/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/FirmWire%2FFirmWire/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/FirmWire%2FFirmWire/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/FirmWire","download_url":"https://codeload.github.com/FirmWire/FirmWire/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/FirmWire%2FFirmWire/sbom","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":264925440,"owners_count":23684151,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["baseband","emulation","fuzzing","introspection","mediatek","qemu","samsung"],"created_at":"2024-08-04T17:03:21.295Z","updated_at":"2025-07-12T02:30:43.595Z","avatar_url":"https://github.com/FirmWire.png","language":"Python","readme":"\u003cpre align=\"center\"\u003e\n              ___            __      __                         \n-.     .-.   | __|(+) _ _ _ _\\ \\    / /(+) _ _ ___    .-.     .-\n  \\   /   \\  | _|  | | '_| '  \\ \\/\\/ /  | | '_/ -_)  /   \\   /  \n   '-'     '-|_|   | |_| |_|_|_\\_/\\_/   | |_| \\___|-'     '-'   \n             ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~             \n\u003c/pre\u003e\n\n# FirmWire\n\nFirmWire is a full-system baseband firmware analysis platform that supports Samsung and MediaTek. It enables fuzzing, root-cause analysis, and debugging of baseband firmware images. **See the [FirmWire documentation](https://firmwire.github.io/docs/installation.html) to get started!**\n\n\u003cp align=\"center\"\u003e\n\u003cimg width=\"750\" src=\"https://user-images.githubusercontent.com/3030665/158176187-97265e7b-bf7c-41d8-a5b2-fbbadbfe25d6.gif\" /\u003e\n\u003c/p\u003e\n\n\n## BibTeX\n\u003ca href=\"https://hernan.de/research/papers/firmwire-ndss22-hernandez.pdf\"\u003e \u003cimg title=\"\" src=\"https://user-images.githubusercontent.com/3030665/149030164-2adf65b2-114a-4f07-82ea-67cf1f65edef.png\" alt=\"FirmWire thumbnail\" align=\"right\" width=\"200\"\u003e\u003c/a\u003e\nFirmWire is the result of a multi-year, cross university research effort.\nSee the [paper](https://hernan.de/research/papers/firmwire-ndss22-hernandez.pdf) for more details.\nFor reproducible research and experimental data from our paper, see the [NDSS'22 repository](https://github.com/FirmWire/ndss22_experiments).\n\nIf you are using FirmWire in an academic paper please use this to cite it:\n\n```\n@inproceedings{hernandez_firmwire_2022,\n  title = {{FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware}},\n  shorttitle = {{FirmWire}},\n  booktitle = {{ Symposium on Network and Distributed System Security (NDSS) }},\n  author = {Hernandez, Grant and Muench, Marius and Maier, Dominik and Milburn, Alyssa and Park, Shinjo and Scharnowski, Tobias and Tucker, Tyler and Traynor, Patrick and Butler, Kevin R. B.},\n  year = {2022}\n}\n```\n\n## FirmWire's License\n\nFirmWire is licensed under BSD-3 and developed by \"Team FirmWire\", which currently consists of the authors on the NDSS paper unless stated otherwise. We expect FirmWire to be used for commercial purposes (e.g. private baseband vulnerability research, bug bounties, etc.). The license permits this. We (Team FirmWire) _request_ that users in these settings notify us through public (e.g. issues) or private (e.g. email, Signal) means about your use. We are curious! If FirmWire or derived work helped you find a vulnerability, we'd also like to know in order to add it to the FirmWire trophy wall. Finally, one or more members of Team FirmWire may be willing to provide consulting services such as trainings, custom extensions to FirmWire, advice, and the like. Please reach out if interested.\n\n","funding_links":[],"categories":["其他_安全与渗透","Firmware Security","Firmware \u0026 Kernel Analysis","Python","Security"],"sub_categories":["网络服务_其他","Dynamic Analysis and Emulation","Case Studies","Security Exploitation/fuzzing Frameworks"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FFirmWire%2FFirmWire","html_url":"https://awesome.ecosyste.ms/projects/github.com%2FFirmWire%2FFirmWire","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FFirmWire%2FFirmWire/lists"}