CERTCC / trommelLinks
TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators
☆209Updated 5 years ago
Alternatives and similar repositories for trommel
Users that are interested in trommel are comparing it to the libraries listed below
Sorting:
- Decept Network Protocol Proxy☆277Updated 2 years ago
- The first open source vulnerability scanner for firmwares☆195Updated 8 years ago
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆174Updated 7 years ago
- The USB host security assessment tool☆281Updated 6 years ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆182Updated 5 years ago
- Platform Firmware Auditing Tool☆131Updated 6 years ago
- A tool for checking exploitability☆210Updated 6 years ago
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆114Updated 4 years ago
- BSidesSF CTF 2017 release☆126Updated 3 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆325Updated 4 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆300Updated 2 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆74Updated 9 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- ☆106Updated 9 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆161Updated 7 years ago
- URGENT/11 detection tool by Armis☆62Updated 5 years ago
- ☆113Updated 8 years ago
- A repository of challenges from various CTF competitions.☆156Updated 11 years ago
- ☆611Updated 2 years ago
- Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.☆207Updated 6 years ago
- Main repository to pull all NCC Group Cisco ASA-related tool projects.☆231Updated 6 years ago
- The Multiplatform Linux Sandbox☆263Updated 3 years ago
- Fuzzing Browsers☆311Updated 2 years ago
- Small CTF challenges running on Docker☆159Updated 6 years ago
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆51Updated 8 years ago
- protocol fuzzing toolkit☆127Updated 6 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- ☆79Updated 2 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆264Updated 3 years ago