| attify/firmware-analysis-toolkit |
1,030 |
|
0 |
0 |
over 3 years ago |
0 |
|
40 |
mit |
Python |
| Toolkit to emulate firmware and analyse it for security vulnerabilities |
| Cr4sh/ThinkPwn |
621 |
|
0 |
0 |
almost 4 years ago |
0 |
|
0 |
gpl-3.0 |
C |
| Lenovo ThinkPad System Management Mode arbitrary code execution 0day exploit |
| nsacyber/Hardware-and-Firmware-Security-Guidance |
563 |
|
0 |
0 |
about 3 years ago |
0 |
|
5 |
other |
C |
| Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber |
| cloud-hypervisor/rust-hypervisor-firmware |
562 |
|
0 |
0 |
about 2 years ago |
0 |
|
14 |
apache-2.0 |
Rust |
| ChrisTheCoolHut/Firmware_Slap |
418 |
|
0 |
0 |
over 5 years ago |
0 |
|
7 |
gpl-3.0 |
Python |
| Discovering vulnerabilities in firmware through concolic analysis and function clustering. |
| sgayou/subaru-starlink-research |
405 |
|
0 |
0 |
over 5 years ago |
0 |
|
0 |
mit |
|
| Subaru StarLink persistent root code execution. |
| airbus-seclab/ilo4_toolbox |
399 |
|
0 |
0 |
about 2 years ago |
0 |
|
5 |
gpl-2.0 |
Python |
| Toolbox for HPE iLO4 & iLO5 analysis |
| ucsb-seclab/karonte |
235 |
|
0 |
0 |
over 4 years ago |
0 |
|
4 |
bsd-2-clause |
Python |
| Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware |
| OWASP/IoTGoat |
219 |
|
0 |
0 |
over 5 years ago |
0 |
|
2 |
mit |
C |
| IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly found vulnerabilities in IoT devices. |
| Cr4sh/fwexpl |
205 |
|
0 |
0 |
almost 4 years ago |
0 |
|
0 |
gpl-3.0 |
C++ |
| PC firmware exploitation tool and library |