TROMMEL sifts through embedded device files to identify potential vulnerable indicators. It identifies the following indicators related to:
It has also integrated vFeed which allows for further in-depth vulnerability analysis of identified indicators to enrich the output.
Also Read : Top 5 DDoS Attacking Tools For Linux,Windows & Android
Usage
$ trommel.py –help
Output TROMMEL results to a file based on a given directory. By default, only searches plain text files.
$ trommel.py -p /directory -o output_file
Output TROMMEL results to a file based on a given directory. Search both binary and plain text files.
$ trommel.py -p /directory -o output_file -b
Notes
Credit : Kyle O’Meara
In MySQL Server 5.5 and earlier versions, the MyISAM was the default storage engine. So,…
A newly disclosed vulnerability in Microsoft Authenticator could expose one time sign in codes or…
Modrinth is a modern platform that’s rapidly changing the landscape of Minecraft modding, providing an…
A new, highly sophisticated malware campaign named BlackSanta has emerged, primarily targeting HR and recruitment…
Perplexity has unveiled an exciting new feature, Personal Computer, which allows AI agents to seamlessly…
In a recent cyber incident, a group named CARDINAL, associated with the label Russian Legion,…