TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators
☆214Jun 23, 2020Updated 5 years ago
Alternatives and similar repositories for trommel
Users that are interested in trommel are comparing it to the libraries listed below
Sorting:
- Android Automation Tool☆21May 9, 2018Updated 7 years ago
- Platform Firmware Auditing Tool☆131Sep 7, 2018Updated 7 years ago
- Burp extension to help developers replicate findings from pen tests☆70Jul 22, 2024Updated last year
- WEB SERVICE SECURITY ASSESSMENT TOOL☆390Sep 24, 2021Updated 4 years ago
- Open source Active Directory security audit framework.☆137Jan 15, 2018Updated 8 years ago
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆223Apr 15, 2019Updated 6 years ago
- Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.☆209Nov 16, 2018Updated 7 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆114Feb 9, 2019Updated 7 years ago
- a CLI for ephemeral penetration testing☆16Dec 10, 2019Updated 6 years ago
- snake - a malware storage zoo☆217Jul 11, 2023Updated 2 years ago
- First IDE for Nmap Script (NSE) Development.☆359Aug 8, 2020Updated 5 years ago
- ANWI - All New Wireless IDS☆29Aug 3, 2018Updated 7 years ago
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆424Updated this week
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆164Mar 15, 2018Updated 7 years ago
- Pre-OS microcode updater☆43Aug 25, 2018Updated 7 years ago
- [BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack☆107Jan 6, 2023Updated 3 years ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆86Mar 22, 2024Updated last year
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- Graphical Realism Framework for Industrial Control Simulations☆225Jun 20, 2024Updated last year
- Mallet is an intercepting proxy for arbitrary protocols☆289Apr 14, 2025Updated 10 months ago
- Firmware Analysis and Comparison Tool☆1,420Feb 19, 2026Updated last week
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97May 12, 2018Updated 7 years ago
- ☆137Mar 20, 2019Updated 6 years ago
- Script for searching the extracted firmware file system for goodies!☆1,191Aug 29, 2023Updated 2 years ago
- Tool for introspection of SSL\TLS sessions☆142Jan 26, 2026Updated last month
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆479Sep 17, 2020Updated 5 years ago
- Community-based integrated malware identification system☆81Dec 10, 2022Updated 3 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- JTAGulator: Assisted discovery of on-chip debug interfaces☆765Jul 29, 2025Updated 7 months ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆266Nov 30, 2018Updated 7 years ago
- Kernel-Mode Rootkit Hunter☆376Nov 13, 2021Updated 4 years ago
- Test CVE-2018-0296 and extract usernames☆106Dec 9, 2018Updated 7 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 6 years ago
- Collecting & Hunting for IOCs with gusto and style☆240Aug 1, 2021Updated 4 years ago
- DejaVU - Open Source Deception Framework☆426Aug 2, 2025Updated 6 months ago
- ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec.☆2,438Jun 11, 2025Updated 8 months ago
- Fuzzing Browsers☆316Dec 5, 2022Updated 3 years ago