EMBArk - The firmware security scanning environment
☆376Jan 16, 2026Updated 2 months ago
Alternatives and similar repositories for embark
Users that are interested in embark are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- EMBA - The firmware security analyzer☆3,403Mar 16, 2026Updated last week
- Firmware Analysis and Comparison Tool☆1,432Updated this week
- EMUX Firmware Emulation Framework (formerly ARMX)☆848Aug 22, 2025Updated 7 months ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆448Oct 5, 2025Updated 5 months ago
- Raw binary firmware analysis software☆571Jun 6, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- cwe_checker finds vulnerable patterns in binary executables☆1,327Apr 10, 2025Updated 11 months ago
- Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis☆842Dec 25, 2025Updated 3 months ago
- Toolkit to emulate firmware and analyse it for security vulnerabilities☆1,540Sep 16, 2024Updated last year
- Script for searching the extracted firmware file system for goodies!☆1,196Aug 29, 2023Updated 2 years ago
- Platform for emulation and dynamic analysis of Linux-based firmware☆2,056Jul 21, 2024Updated last year
- FirmWire is a full-system baseband firmware emulation platform for fuzzing, debugging, and root-cause analysis of smartphone baseband fir…☆847Jan 5, 2026Updated 2 months ago
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆241May 2, 2025Updated 10 months ago
- OFRAK: unpack, modify, and repack binaries.☆2,033Updated this week
- Raiden project☆24Nov 7, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Laser Fault Injection on a Budget: RP2350 Edition☆13Dec 14, 2024Updated last year
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆290Jan 31, 2026Updated last month
- A curated list of awesome embedded and IoT security resources.☆2,259Oct 17, 2023Updated 2 years ago
- ☆11Nov 14, 2024Updated last year
- Seer is a tool that recognizes the architecture of a binary file☆102May 13, 2022Updated 3 years ago
- FIRM-AFL is the first high-throughput greybox fuzzer for IoT firmware.☆459Mar 22, 2024Updated 2 years ago
- BinAbsInspector: Vulnerability Scanner for Binaries☆1,670Jun 17, 2024Updated last year
- A Curated list of Security Resources for all connected things☆3,216Mar 7, 2026Updated 2 weeks ago
- A tool for firmware cartography☆165Dec 8, 2025Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ToolSet for VxWorks Based Embedded Device Analyses☆379Sep 24, 2024Updated last year
- Side-channel attac☆10Mar 25, 2022Updated 4 years ago
- Extract files from any kind of container formats☆2,449Updated this week
- ☆18Mar 26, 2024Updated last year
- CveXplore☆42Sep 12, 2025Updated 6 months ago
- IDA Pro plugin for query based searching within the binary useful mainly for vulnerability research.☆660May 13, 2025Updated 10 months ago
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆16Sep 11, 2020Updated 5 years ago
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆341Dec 12, 2024Updated last year
- ☆108Dec 5, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆55Dec 8, 2023Updated 2 years ago
- FirmSec Dataset☆12Sep 1, 2021Updated 4 years ago
- ☆187Nov 29, 2023Updated 2 years ago
- An automatic Blind ROP exploitation tool☆208Jun 9, 2023Updated 2 years ago
- Callisto - An Intelligent Binary Vulnerability Analysis Tool☆372Jul 24, 2023Updated 2 years ago
- the Network Protocol Fuzzer that we will want to use.☆793Jan 29, 2024Updated 2 years ago
- A collection of my Semgrep rules to facilitate vulnerability research.☆799Mar 9, 2026Updated 2 weeks ago