PreOS-Security / fwauditLinks
Platform Firmware Auditing Tool
☆131Updated 7 years ago
Alternatives and similar repositories for fwaudit
Users that are interested in fwaudit are comparing it to the libraries listed below
Sorting:
- Pre-OS microcode updater☆43Updated 7 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆212Updated 5 years ago
- X41 Smartcard Fuzzer☆120Updated 6 years ago
- The Cisco IOS Debugger and Integrated Disassembler Environment☆78Updated 7 years ago
- The Zulu fuzzer☆124Updated 8 years ago
- Network and USB protocol fuzzing toolkit.☆34Updated 8 years ago
- All related files and slides for past talks☆44Updated 2 years ago
- asadbg is a framework of tools to aid in automating live debugging of Cisco ASA devices☆79Updated 3 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 6 years ago
- Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.☆208Updated 7 years ago
- Repository containing many useful scripts☆75Updated 3 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 9 years ago
- A GUI-based USB device fuzzer☆64Updated 8 years ago
- URGENT/11 detection tool by Armis☆62Updated 6 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated last year
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆24Updated 8 years ago
- POLAR☆74Updated 6 years ago
- ☆79Updated 3 years ago
- A tool for checking exploitability☆210Updated 6 years ago
- ☆50Updated 3 weeks ago
- Main repository to pull all NCC Group Cisco ASA-related tool projects.☆230Updated 7 years ago
- Binary and Directory tree comparison tool using Fuzzy Hashing☆84Updated 10 years ago
- ☆92Updated 7 years ago
- a 802.11 wireless fuzzer☆93Updated 12 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- The first open source vulnerability scanner for firmwares☆196Updated 9 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- A python implementation of a grep friendly ftrace wrapper☆80Updated 6 years ago