binwalk by ReFirmLabs

Firmware Analysis Tool

created at Nov. 15, 2013, 8:45 p.m.

Python

369 +0

10,194 +12

1,473 +2

GitHub
cwe_checker by fkie-cad

cwe_checker finds vulnerable patterns in binary executables

created at Oct. 8, 2018, 12:03 p.m.

Rust

28 +0

1,059 +3

115 +0

GitHub
radare2 by radareorg

UNIX-like reverse engineering framework and command-line toolset

created at July 3, 2012, 7:42 a.m.

C

483 -2

19,678 +20

2,938 +1

GitHub
firmadyne by firmadyne

Platform for emulation and dynamic analysis of Linux-based firmware

created at Feb. 15, 2016, 7:56 p.m.

Shell

73 +0

1,765 +0

337 +0

GitHub
firmwalker by craigz28

Script for searching the extracted firmware file system for goodies!

created at Feb. 3, 2016, 1:37 a.m.

Shell

43 +0

989 +1

181 +0

GitHub
Rhme-2017 by Riscure

Riscure Hack Me embedded hardware CTF 2017-2018.

created at Aug. 18, 2017, 6:25 a.m.

Unknown languages

8 +0

83 +0

14 +0

GitHub
Rhme-2016 by Riscure

Rhme2 challenge (2016)

created at July 29, 2016, 2:06 p.m.

C

18 +0

290 +0

50 +0

GitHub
trommel by CERTCC

TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators

created at Oct. 19, 2017, 12:27 p.m.

Python

20 +0

200 +0

47 +0

GitHub
RHme-2015 by Riscure

RHme+ 2015 challenge

created at Feb. 2, 2016, 5:07 p.m.

C

11 +0

106 +0

15 +0

GitHub
JTAGenum by cyphunk

Given an Arduino compatible microcontroller or Raspberry PI (experimental), JTAGenum scans pins[] for basic JTAG functionality and can be used to enumerate the Instruction Register for undocumented instructions. Props to JTAG scanner and Arduinull which came before JTAGenum and forwhich much of the code and logic is based on. Feel free to branch and modify religiously (readme, credits, whatever)

created at April 15, 2010, 9:11 p.m.

C++

40 +0

664 +3

98 +0

GitHub
fact_extractor by fkie-cad

Standalone Utility for FACT-like extraction

created at Feb. 11, 2019, 9:20 a.m.

Python

13 +0

77 +0

31 +0

GitHub
IoTGoat by scriptingxss

IoTGoat is a deliberately insecure firmware based on OpenWrt.

created at Feb. 4, 2019, 5:01 p.m.

C

23 +0

178 +0

42 +0

GitHub
Firmware_Slap by ChrisTheCoolHut

Discovering vulnerabilities in firmware through concolic analysis and function clustering.

created at June 25, 2019, 2:24 a.m.

Python

13 +0

463 +0

79 +0

GitHub
fwanalyzer by cruise-automation

a tool to analyze filesystem images for security

created at July 24, 2019, 6:41 p.m.

Go

26 +0

481 +0

75 +0

GitHub
glasgow by GlasgowEmbedded

Scots Army Knife for electronics

created at Jan. 21, 2018, 8:05 a.m.

Python

65 +0

1,862 +2

160 +3

GitHub
PRET by RUB-NDS

Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.

created at June 24, 2016, 9:33 a.m.

Python

199 -1

3,769 +1

602 +1

GitHub
csaw_esc_2019 by TrustworthyComputing

CSAW Embedded Security Challenge 2019

created at March 10, 2019, 5:19 a.m.

Python

11 +0

34 +0

5 +0

GitHub
killerbee by riverloopsec

IEEE 802.15.4/ZigBee Security Research Toolkit

created at March 24, 2015, 11:19 a.m.

C

47 +0

736 +0

215 +0

GitHub
routersploit by threat9

Exploitation Framework for Embedded Devices

created at March 30, 2016, 11:43 a.m.

Python

623 -1

11,899 +8

2,304 -2

GitHub
hal by emsec

HAL – The Hardware Analyzer

created at Feb. 4, 2019, 12:37 p.m.

C++

24 +0

514 +2

73 +0

GitHub