secjey / static-firmware-analysis
Toolkit to perform automatic static analyses of firmware images based on custom user rules.
☆10Updated 7 years ago
Alternatives and similar repositories for static-firmware-analysis:
Users that are interested in static-firmware-analysis are comparing it to the libraries listed below
- Penetration testing framework for ZigBee security research.☆112Updated 7 years ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆181Updated 4 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆158Updated 7 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆208Updated 4 years ago
- ☆106Updated 9 years ago
- The USB host security assessment tool☆276Updated 6 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆257Updated 3 years ago
- GUI Framework on top of Killerbee☆80Updated 7 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 6 years ago
- A few ZigBee Tools to compliment KillerBee☆52Updated 8 years ago
- a 802.11 wireless fuzzer☆91Updated 12 years ago
- This repo contains alls the vulnerabilities identified as a part of security research against IoT devices☆23Updated 3 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated 7 months ago
- The first open source vulnerability scanner for firmwares☆194Updated 8 years ago
- Toolkit for implant attack of IoT devices☆134Updated 6 years ago
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆172Updated 7 years ago
- IEEE 802.15.4/ZigBee Security Research Toolkit☆64Updated 8 years ago
- A simple library to intercept calls to libnvram when running embedded linux applications in emulated environments.☆237Updated last year
- RHme+ 2015 challenge☆109Updated 8 years ago
- ☆149Updated 10 years ago
- Riscure Hack Me embedded hardware CTF 2017-2018.☆86Updated 6 years ago
- scapy-radio (from original Hg repo)☆86Updated 2 years ago
- ☆191Updated 7 years ago
- A tool for checking exploitability☆209Updated 5 years ago
- Keep track of the labs from the book "Practical Malware Analysis"☆168Updated 5 years ago
- GUI tool to create ROP chains using the ropper API☆156Updated 6 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆325Updated 3 years ago
- Purposely Vulnerable Embedded Device☆22Updated 7 years ago
- Simplify format string exploitation.☆338Updated 3 years ago