e-m-b-a / embaLinks
EMBA - The firmware security analyzer
☆2,981Updated last week
Alternatives and similar repositories for emba
Users that are interested in emba are comparing it to the libraries listed below
Sorting:
- EMBArk - The firmware security scanning environment☆341Updated last week
- Firmware Analysis and Comparison Tool☆1,335Updated this week
- OFRAK: unpack, modify, and repack binaries.☆1,950Updated 2 weeks ago
- Platform for emulation and dynamic analysis of Linux-based firmware☆1,932Updated 10 months ago
- Toolkit to emulate firmware and analyse it for security vulnerabilities☆1,435Updated 8 months ago
- Script for searching the extracted firmware file system for goodies!☆1,128Updated last year
- wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kerne…☆1,612Updated last week
- cwe_checker finds vulnerable patterns in binary executables☆1,226Updated last month
- A curated list of awesome embedded and IoT security resources.☆1,997Updated last year
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆772Updated 5 months ago
- EMUX Firmware Emulation Framework (formerly ARMX)☆746Updated 2 weeks ago
- A True Instrumentable Binary Emulation Framework☆5,453Updated 3 weeks ago
- Extract files from any kind of container formats☆2,311Updated this week
- UNIX-like reverse engineering framework and command-line toolset.☆2,938Updated this week
- A fork and successor of the Sulley Fuzzing Framework☆2,162Updated last week
- Adversary tradecraft detection, protection, and hunting☆2,342Updated this week
- FirmWire is a full-system baseband firmware emulation platform for fuzzing, debugging, and root-cause analysis of smartphone baseband fir…☆802Updated 7 months ago
- Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based)☆3,188Updated 2 weeks ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,178Updated 3 weeks ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆1,972Updated 3 months ago
- Tutorials, examples, discussions, research proposals, and other resources related to fuzzing☆3,652Updated 7 months ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,860Updated last year
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆2,182Updated 5 months ago
- Portable Executable reversing tool with a friendly GUI☆3,104Updated last month
- A tool for checking the security hardening options of the Linux kernel☆1,878Updated 3 weeks ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆6,907Updated last year
- awesome-linux-rootkits☆1,846Updated 4 months ago
- Materials for Windows Malware Analysis training (volume 1)☆1,989Updated 11 months ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆420Updated 3 years ago
- A Curated list of IoT Security Resources☆2,884Updated 6 months ago