CERTCC / trommel
TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators
☆208Updated 4 years ago
Alternatives and similar repositories for trommel:
Users that are interested in trommel are comparing it to the libraries listed below
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆173Updated 7 years ago
- The first open source vulnerability scanner for firmwares☆195Updated 8 years ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆182Updated 5 years ago
- Decept Network Protocol Proxy☆276Updated 2 years ago
- The USB host security assessment tool☆279Updated 6 years ago
- A tool for checking exploitability☆209Updated 5 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆258Updated 3 years ago
- Fuzzing Browsers☆311Updated 2 years ago
- ☆609Updated 2 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- Platform Firmware Auditing Tool☆131Updated 6 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆158Updated 7 years ago
- GUI tool to create ROP chains using the ropper API☆156Updated 7 years ago
- The Multiplatform Linux Sandbox☆260Updated 3 years ago
- A fuzzing framework for network servers☆119Updated 6 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- Main repository to pull all NCC Group Cisco ASA-related tool projects.☆230Updated 6 years ago
- This project contains the source code for the CERT Basic Fuzzing Framework (BFF) and the CERT Failure Observation Engine (FOE).☆268Updated last year
- Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.☆207Updated 6 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆301Updated 2 years ago
- This repo contains alls the vulnerabilities identified as a part of security research against IoT devices☆23Updated 3 years ago
- Small CTF challenges running on Docker☆158Updated 6 years ago
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆477Updated 4 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆74Updated 9 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆176Updated 2 years ago
- The Damn Vulnerable Router Firmware Project☆687Updated 4 years ago
- ☆80Updated 2 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 7 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆194Updated 9 years ago