TROMMEL sifts through embedded device files to identify potential vulnerable indicators. It identifies the following indicators related to:
It has also integrated vFeed which allows for further in-depth vulnerability analysis of identified indicators to enrich the output.
Also Read : Top 5 DDoS Attacking Tools For Linux,Windows & Android
Usage
$ trommel.py –help
Output TROMMEL results to a file based on a given directory. By default, only searches plain text files.
$ trommel.py -p /directory -o output_file
Output TROMMEL results to a file based on a given directory. Search both binary and plain text files.
$ trommel.py -p /directory -o output_file -b
Notes
Credit : Kyle O’Meara
Welcome to the Cybersecurity Toolkit, a collection of essential Python tools designed for penetration testing…
The main objective of the creation of this laboratory is to transport the applications, tools…
"Dark FB" is a powerful toolkit designed for those who wish to delve deeper into…
Unlock the potential of ethical hacking with Wifi-Hacking.py, a powerful cybersecurity tool designed to navigate…
This repository was created with the aim of assisting companies and independent researchers about Tactics,…
A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path…