EMBArk - The firmware security scanning environment
☆379Apr 28, 2026Updated last week
Alternatives and similar repositories for embark
Users that are interested in embark are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- EMBA - The firmware security analyzer☆3,437Apr 28, 2026Updated last week
- Firmware Analysis and Comparison Tool☆1,440Updated this week
- EMUX Firmware Emulation Framework (formerly ARMX)☆855Aug 22, 2025Updated 8 months ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆461Oct 5, 2025Updated 7 months ago
- Raw binary firmware analysis software☆576Jun 6, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- cwe_checker finds vulnerable patterns in binary executables☆1,334Apr 10, 2025Updated last year
- Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis☆858Apr 11, 2026Updated 3 weeks ago
- Script for searching the extracted firmware file system for goodies!☆1,204Aug 29, 2023Updated 2 years ago
- Platform for emulation and dynamic analysis of Linux-based firmware☆2,066Jul 21, 2024Updated last year
- FirmWire is a full-system baseband firmware emulation platform for fuzzing, debugging, and root-cause analysis of smartphone baseband fir…☆852Jan 5, 2026Updated 4 months ago
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆241May 2, 2025Updated last year
- OFRAK: unpack, modify, and repack binaries.☆2,047Apr 22, 2026Updated last week
- Raiden project☆24Nov 7, 2021Updated 4 years ago
- Laser Fault Injection on a Budget: RP2350 Edition☆13Dec 14, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆295Jan 31, 2026Updated 3 months ago
- A curated list of awesome embedded and IoT security resources.☆2,305Oct 17, 2023Updated 2 years ago
- ☆11Nov 14, 2024Updated last year
- Seer is a tool that recognizes the architecture of a binary file☆102May 13, 2022Updated 3 years ago
- a tool to analyze filesystem images for security☆514Oct 8, 2023Updated 2 years ago
- FIRM-AFL is the first high-throughput greybox fuzzer for IoT firmware.☆460Mar 22, 2024Updated 2 years ago
- BinAbsInspector: Vulnerability Scanner for Binaries☆1,672Jun 17, 2024Updated last year
- A Curated list of Security Resources for all connected things☆3,305Apr 25, 2026Updated last week
- A tool for firmware cartography☆169Dec 8, 2025Updated 4 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ToolSet for VxWorks Based Embedded Device Analyses☆381Sep 24, 2024Updated last year
- Side-channel attac☆10Mar 25, 2022Updated 4 years ago
- Extract files from any kind of container formats☆2,491Updated this week
- ☆18Mar 26, 2024Updated 2 years ago
- CveXplore☆41Apr 20, 2026Updated 2 weeks ago
- IDA Pro plugin for query based searching within the binary useful mainly for vulnerability research.☆661May 13, 2025Updated 11 months ago
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆16Sep 11, 2020Updated 5 years ago
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆346Dec 12, 2024Updated last year
- ☆108Dec 5, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆54Dec 8, 2023Updated 2 years ago
- FirmSec Dataset☆12Sep 1, 2021Updated 4 years ago
- An automatic Blind ROP exploitation tool☆211Jun 9, 2023Updated 2 years ago
- Callisto - An Intelligent Binary Vulnerability Analysis Tool☆371Jul 24, 2023Updated 2 years ago
- ☆188Nov 29, 2023Updated 2 years ago
- the Network Protocol Fuzzer that we will want to use.☆791Jan 29, 2024Updated 2 years ago
- A collection of my Semgrep rules to facilitate vulnerability research.☆811Apr 12, 2026Updated 3 weeks ago