Tool for decrypting the firmware files for Samsung SSDs
created at April 8, 2020, 11:31 p.m.
CSAW Embedded Security Challenge 2019
created at March 10, 2019, 5:19 a.m.
Standalone Utility for FACT-like extraction
created at Feb. 11, 2019, 9:20 a.m.
Discovering vulnerabilities in firmware through concolic analysis and function clustering.
created at June 25, 2019, 2:24 a.m.
IoTGoat is a deliberately insecure firmware based on OpenWrt.
created at Feb. 4, 2019, 5:01 p.m.
a tool to analyze filesystem images for security
created at July 24, 2019, 6:41 p.m.
cwe_checker finds vulnerable patterns in binary executables
created at Oct. 8, 2018, 12:03 p.m.
Low-level NAND Flash dump and parsing utility
created at May 8, 2014, 10:17 p.m.
HomePwn - Swiss Army Knife for Pentesting of IoT Devices
created at Aug. 7, 2019, 9:24 a.m.
Script for searching the extracted firmware file system for goodies!
created at Feb. 3, 2016, 1:37 a.m.
Given an Arduino compatible microcontroller or Raspberry PI (experimental), JTAGenum scans pins[] for basic JTAG functionality and can be used to enumerate the Instruction Register for undocumented instructions. Props to JTAG scanner and Arduinull which came before JTAGenum and forwhich much of the code and logic is based on. Feel free to branch and modify religiously (readme, credits, whatever)
created at April 15, 2010, 9:11 p.m.
IEEE 802.15.4/ZigBee Security Research Toolkit
created at March 24, 2015, 11:19 a.m.