cwe_checker by fkie-cad

cwe_checker finds vulnerable patterns in binary executables

updated at May 12, 2024, 6:37 a.m.

Rust

28 +0

1,059 +3

115 +0

GitHub
radare2 by radareorg

UNIX-like reverse engineering framework and command-line toolset

updated at May 12, 2024, 5:08 a.m.

C

483 -2

19,678 +20

2,938 +1

GitHub
emba by e-m-b-a

EMBA - The firmware security analyzer

updated at May 12, 2024, 3:55 a.m.

Shell

43 +0

2,441 +9

211 +1

GitHub
routersploit by threat9

Exploitation Framework for Embedded Devices

updated at May 12, 2024, 12:33 a.m.

Python

623 -1

11,899 +8

2,304 -2

GitHub
hal by emsec

HAL – The Hardware Analyzer

updated at May 11, 2024, 8:32 p.m.

C++

24 +0

514 +2

73 +0

GitHub
PRET by RUB-NDS

Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.

updated at May 11, 2024, 8:29 p.m.

Python

199 -1

3,769 +1

602 +1

GitHub
binwalk by ReFirmLabs

Firmware Analysis Tool

updated at May 11, 2024, 10:13 a.m.

Python

369 +0

10,194 +12

1,473 +2

GitHub
flashrom by flashrom

Send patches to https://review.coreboot.org: https://www.flashrom.org/Development_Guidelines#GitHub

updated at May 11, 2024, 8:17 a.m.

C

59 +1

801 +1

426 +0

GitHub
glasgow by GlasgowEmbedded

Scots Army Knife for electronics

updated at May 10, 2024, 1:40 p.m.

Python

65 +0

1,862 +2

160 +3

GitHub
JTAGenum by cyphunk

Given an Arduino compatible microcontroller or Raspberry PI (experimental), JTAGenum scans pins[] for basic JTAG functionality and can be used to enumerate the Instruction Register for undocumented instructions. Props to JTAG scanner and Arduinull which came before JTAGenum and forwhich much of the code and logic is based on. Feel free to branch and modify religiously (readme, credits, whatever)

updated at May 9, 2024, 9:12 p.m.

C++

40 +0

664 +3

98 +0

GitHub
cotopaxi by Samsung

Set of tools for security testing of Internet of Things devices using specific network IoT protocols

updated at May 9, 2024, 5:37 p.m.

Python

15 +0

344 +1

78 +0

GitHub
HomePWN by Telefonica

HomePwn - Swiss Army Knife for Pentesting of IoT Devices

updated at May 9, 2024, 5:19 p.m.

Python

36 +0

828 +2

136 +0

GitHub
firmwalker by craigz28

Script for searching the extracted firmware file system for goodies!

updated at May 9, 2024, 3:06 a.m.

Shell

43 +0

989 +1

181 +0

GitHub
firmadyne by firmadyne

Platform for emulation and dynamic analysis of Linux-based firmware

updated at May 4, 2024, 10:59 a.m.

Shell

73 +0

1,765 +0

337 +0

GitHub
killerbee by riverloopsec

IEEE 802.15.4/ZigBee Security Research Toolkit

updated at May 4, 2024, 8:24 a.m.

C

47 +0

736 +0

215 +0

GitHub
fact_extractor by fkie-cad

Standalone Utility for FACT-like extraction

updated at April 29, 2024, 9:16 a.m.

Python

13 +0

77 +0

31 +0

GitHub
Rhme-2016 by Riscure

Rhme2 challenge (2016)

updated at April 28, 2024, 4:29 p.m.

C

18 +0

290 +0

50 +0

GitHub
fwanalyzer by cruise-automation

a tool to analyze filesystem images for security

updated at April 24, 2024, 3:31 p.m.

Go

26 +0

481 +0

75 +0

GitHub
dumpflash by ohjeongwook

Low-level NAND Flash dump and parsing utility

updated at April 21, 2024, 1:25 p.m.

Python

29 +0

281 +0

102 +0

GitHub
IoTGoat by scriptingxss

IoTGoat is a deliberately insecure firmware based on OpenWrt.

updated at April 19, 2024, 1:40 p.m.

C

23 +0

178 +0

42 +0

GitHub