CERTCC / trommelLinks
TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators
☆212Updated 5 years ago
Alternatives and similar repositories for trommel
Users that are interested in trommel are comparing it to the libraries listed below
Sorting:
- Decept Network Protocol Proxy☆281Updated 2 years ago
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆173Updated 8 years ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆184Updated 5 years ago
- The USB host security assessment tool☆285Updated 7 years ago
- The first open source vulnerability scanner for firmwares☆196Updated 9 years ago
- A tool for checking exploitability☆210Updated 6 years ago
- The Zulu fuzzer☆124Updated 8 years ago
- Main repository to pull all NCC Group Cisco ASA-related tool projects.☆230Updated 7 years ago
- A repository of challenges from various CTF competitions.☆156Updated 11 years ago
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆53Updated 9 years ago
- BSidesSF CTF 2017 release☆126Updated 3 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆76Updated 9 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆163Updated 7 years ago
- Platform Firmware Auditing Tool☆131Updated 7 years ago
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆113Updated 5 years ago
- ☆111Updated 8 years ago
- Small CTF challenges running on Docker☆158Updated 7 years ago
- GUI tool to create ROP chains using the ropper API☆158Updated 7 years ago
- ☆79Updated 3 years ago
- URGENT/11 detection tool by Armis☆62Updated 6 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆163Updated last week
- The Multiplatform Linux Sandbox☆266Updated 3 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆272Updated 4 years ago
- Evading Snort Intrusion Detection System.☆78Updated 4 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆299Updated 2 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Updated 6 years ago
- Automated Exploit generation with WinDBG☆191Updated 9 years ago
- Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.☆208Updated 7 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆193Updated 10 years ago