e-m-b-a / embaLinks
EMBA - The firmware security analyzer
☆3,141Updated this week
Alternatives and similar repositories for emba
Users that are interested in emba are comparing it to the libraries listed below
Sorting:
- Firmware Analysis and Comparison Tool☆1,379Updated last week
- OFRAK: unpack, modify, and repack binaries.☆1,984Updated this week
- EMBArk - The firmware security scanning environment☆363Updated 3 weeks ago
- Platform for emulation and dynamic analysis of Linux-based firmware☆1,983Updated last year
- FirmWire is a full-system baseband firmware emulation platform for fuzzing, debugging, and root-cause analysis of smartphone baseband fir…☆819Updated last week
- Toolkit to emulate firmware and analyse it for security vulnerabilities☆1,504Updated last year
- cwe_checker finds vulnerable patterns in binary executables☆1,265Updated 5 months ago
- Script for searching the extracted firmware file system for goodies!☆1,165Updated 2 years ago
- A curated list of awesome embedded and IoT security resources.☆2,108Updated last year
- UNIX-like reverse engineering framework and command-line toolset.☆3,112Updated this week
- wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kerne…☆1,671Updated last month
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆820Updated this week
- EMUX Firmware Emulation Framework (formerly ARMX)☆763Updated last month
- A tool for checking the security hardening options of the Linux kernel☆1,961Updated 2 weeks ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,539Updated last week
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆2,447Updated last year
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆2,224Updated 9 months ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆435Updated this week
- A True Instrumentable Binary Emulation Framework☆5,632Updated last month
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,194Updated 4 months ago
- Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read☆1,329Updated 7 months ago
- Attify OS - Distro for pentesting IoT devices☆1,006Updated 4 years ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆914Updated last year
- A fork and successor of the Sulley Fuzzing Framework☆2,231Updated 3 weeks ago
- BinAbsInspector: Vulnerability Scanner for Binaries☆1,644Updated last year
- Checksec☆2,217Updated 3 weeks ago
- A curated list of awesome Ghidra materials☆1,307Updated 3 years ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆2,035Updated 7 months ago
- Adversary tradecraft detection, protection, and hunting☆2,378Updated last week
- ChipWhisperer - the complete open-source toolchain for side-channel power analysis and glitching attacks☆1,309Updated last week