-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathtools.txt
26 lines (23 loc) · 1.21 KB
/
tools.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
firmware analysis:
* binwalk: https://github.com/ReFirmLabs/binwalk
* firmadyne: https://github.com/firmadyne/firmadyne
* binaryanalysis-ng: https://github.com/armijnhemel/binaryanalysis-ng
# * firmware-mod-kit: https://github.com/rampageX/firmware-mod-kit
* radare2: https://github.com/radareorg/radare2
* firmwalker: https://github.com/craigz28/firmwalker
# * bytesweep: https://gitlab.com/bytesweep/bytesweep
binary file analysis:
* ghidra: https://github.com/NationalSecurityAgency/ghidra
# * dex2jar: https://github.com/pxb1988/dex2jar
# * JADx: https://github.com/skylot/jadx
* angr: https://github.com/angr/angr
* ROPGadget: https://github.com/JonathanSalwan/ROPgadget
firmware files:
* damn vulnerable router: https://github.com/praetorian-inc/DVRF
* IoTGoat: https://github.com/scriptingxss/IoTGoat
* netgear nighthawk: http://www.downloads.netgear.com/files/GDC/R6700v3/R6700v3-V1.0.4.84_10.0.58.zip
* tp-link archer a5: https://static.tp-link.com/2019/201909/20190916/Archer%20C50A5(US)_V5_181019.zip
* emulator: https://emulator.tp-link.com/a5-us-v5/Emulator/index.htm
notes:
* https://wiki.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Firmware_Analysis
* https://www.rapid7.com/resources/rop-exploit-explained/