OTARIS / FirmwareCheckLinks
Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.
☆13Updated 4 years ago
Alternatives and similar repositories for FirmwareCheck
Users that are interested in FirmwareCheck are comparing it to the libraries listed below
Sorting:
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆20Updated 4 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 2 years ago
- Static Token And Credential Scanner☆96Updated 2 years ago
- Simple rust fuzzer☆23Updated 4 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- Dependency Combobulator☆93Updated last year
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 3 years ago
- ☆17Updated 6 years ago
- CITL's static analysis engine for native code artifacts☆20Updated 4 years ago
- Script(s) to assist with the setup of WinDBG & mona.py on a Windows 10 VM☆27Updated 2 years ago
- UniSBOM is a tool to build a software bill of materials on any platform with a unified data format.☆35Updated 2 years ago
- ☆15Updated 5 years ago
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆42Updated last week
- ☆44Updated 4 years ago
- Kubernetes Pwnage for all☆57Updated 4 years ago
- Embedded AppSec Best Practices☆41Updated 2 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆13Updated 4 years ago
- CVE Vulnerability scanner of your software bill of materials (SBOM). ASCII text input.☆17Updated 4 years ago
- A beginner-friendly CTF about Kubernetes security.☆78Updated 2 years ago
- Default query sets for Joern☆26Updated 3 years ago
- ☆28Updated last month
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- Public repository for Red Canary Research☆36Updated 4 years ago
- Mayhem example templates for programming languages and fuzzers that you love!☆33Updated last week
- Pattern recognition for hosts, services, and content☆13Updated 2 years ago