From 5ecdaca4669165fde37f6f341966cf3e012b5c10 Mon Sep 17 00:00:00 2001 From: Johannes vom Dorp Date: Fri, 16 Aug 2019 09:36:43 +0200 Subject: [PATCH 1/2] Links to hacker summercamp tools --- readme.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/readme.md b/readme.md index 737751f..52f0bf7 100644 --- a/readme.md +++ b/readme.md @@ -27,14 +27,16 @@ Software tools for analyzing embedded/IoT firmware. ### Analysis Frameworks -- [FACT - The Firmware Analysis and Comparison Tool](https://fkie-cad.github.io/FACT_core/) - Full-featured static analysis framework including extraction of firmware, analysis utilizing different plug-ins and comparison of different firmware versions. - [EXPLIoT](https://gitlab.com/expliot_framework/expliot) - Pentest framework like Metasploit but specialized for IoT. +- [FACT - The Firmware Analysis and Comparison Tool](https://fkie-cad.github.io/FACT_core/) - Full-featured static analysis framework including extraction of firmware, analysis utilizing different plug-ins and comparison of different firmware versions. +- [FwAnalyzer](https://github.com/cruise-automation/fwanalyzer) - Analyze security of firmware based on customized rules. Intended as additional step in DevSecOps, similar to CI. ### Analysis Tools - [Binwalk](https://github.com/ReFirmLabs/binwalk) - Searches a binary for "interesting" stuff. - [Firmadyne](https://github.com/firmadyne/firmadyne) - Tries to emulate and pentest a firmware. - [firmwalker](https://github.com/craigz28/firmwalker) - Searches extracted firmware images for interesting files and information. +- [Firmware Slap](https://github.com/ChrisTheCoolHut/Firmware_Slap) - Discovering vulnerabilities in firmware through concolic analysis and function clustering - [Ghidra](https://ghidra-sre.org/) - Software Reverse Engineering suite; handles arbitrary binaries, if you provide CPU architecture and endianness of the binary. - [Trommel](https://github.com/CERTCC/trommel) - Searches extracted firmware images for interesting files and information. From c9c2d439336e58929ab49a97eed22056b45a6971 Mon Sep 17 00:00:00 2001 From: Johannes vom Dorp Date: Fri, 16 Aug 2019 10:17:05 +0200 Subject: [PATCH 2/2] Period --- readme.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/readme.md b/readme.md index 52f0bf7..24191e1 100644 --- a/readme.md +++ b/readme.md @@ -36,7 +36,7 @@ Software tools for analyzing embedded/IoT firmware. - [Binwalk](https://github.com/ReFirmLabs/binwalk) - Searches a binary for "interesting" stuff. - [Firmadyne](https://github.com/firmadyne/firmadyne) - Tries to emulate and pentest a firmware. - [firmwalker](https://github.com/craigz28/firmwalker) - Searches extracted firmware images for interesting files and information. -- [Firmware Slap](https://github.com/ChrisTheCoolHut/Firmware_Slap) - Discovering vulnerabilities in firmware through concolic analysis and function clustering +- [Firmware Slap](https://github.com/ChrisTheCoolHut/Firmware_Slap) - Discovering vulnerabilities in firmware through concolic analysis and function clustering. - [Ghidra](https://ghidra-sre.org/) - Software Reverse Engineering suite; handles arbitrary binaries, if you provide CPU architecture and endianness of the binary. - [Trommel](https://github.com/CERTCC/trommel) - Searches extracted firmware images for interesting files and information.