Exploitation Framework for Embedded Devices
updated at Oct. 26, 2024, 6:12 a.m.
Discovering vulnerabilities in firmware through concolic analysis and function clustering.
updated at Oct. 25, 2024, 7:13 p.m.
cwe_checker finds vulnerable patterns in binary executables
updated at Oct. 25, 2024, 12:55 a.m.
IoTGoat is a deliberately insecure firmware based on OpenWrt.
updated at Oct. 24, 2024, 10:53 a.m.
Script for searching the extracted firmware file system for goodies!
updated at Oct. 23, 2024, 6:24 p.m.
HomePwn - Swiss Army Knife for Pentesting of IoT Devices
updated at Oct. 23, 2024, 3:31 a.m.
Given an Arduino compatible microcontroller or Raspberry PI (experimental), JTAGenum scans pins[] for basic JTAG functionality and can be used to enumerate the Instruction Register for undocumented instructions. Props to JTAG scanner and Arduinull which came before JTAGenum and forwhich much of the code and logic is based on. Feel free to branch and modify religiously (readme, credits, whatever)
updated at Oct. 22, 2024, 7 p.m.
Standalone Utility for FACT-like extraction
updated at Oct. 21, 2024, 11:57 a.m.
IEEE 802.15.4/ZigBee Security Research Toolkit
updated at Oct. 16, 2024, 6:59 p.m.
Low-level NAND Flash dump and parsing utility
updated at Oct. 13, 2024, 7:41 p.m.
a tool to analyze filesystem images for security
updated at Oct. 6, 2024, 6:49 a.m.