-
-
Notifications
You must be signed in to change notification settings - Fork 275
Referring sites and talks
- SANS Supply Chain Cybersecurity Forum 2025 - Unseen and Unsecured: Firmware Attacks Expanding the Enterprise Attack Surface - YouTube
Intro | EMBA reference |
---|---|
- Embedded and IoT Devices Firmware Security - Article
Intro page | EMBA reference |
---|---|
- An In-Depth Study of Smart Building Systems: Firmware Analysis and Device Emulation - Paper
Intro page | EMBA reference |
---|---|
- Journey with EMBA: A Hardware Hacker's Perspective - LinkedIn
"Firmware analysis is both an art and a science. EMBA respects both sides; it has the technical depth for seasoned researchers and the automation to save time when quick answers are needed."
"For me, EMBA has transformed the most tedious part of my job into the most exciting. If you live in the world of firmware hacking, it’s not just worth trying it’s worth mastering."
- 17th International Conference on Cyber Conflict: The Next Step - Vulnerability Patch Verification for Military Software Systems Through AI-Driven Code-Level Rule Generation - Paper
CCDCOE | EMBA reference |
---|---|
- We Found Real Security Flaws in This Camera Firmware! - YouTube
YouTube | YouTube |
---|---|
- EMBA Firmware Hacking Tutorial (2025) | Real-World Vulnerability Research for Hackers & Researchers - YouTube
- Can I Hack My Own Router With This Tiny Tool? - YouTube
- Challenges and pitfalls while emulating six current Icelandic household routers - Thesis (Bachelor's)
Intro page | EMBA usage |
---|---|
- How Critical are Critical Vulnerabilities? - Drawing a Big Picture and Then Trying to Understand it - Blogpost
Hopefully this user will give us some feedback on the cool things of the commercial binarly solution which we are missing.
- Dealing with Security and Privacy Challenges in Android through App Code Analysis - Paper
Intro page | EMBA usage |
---|---|
- Healthcare Monitors at Risk Beyond a Backdoor - paloalto blog
- What Are Security Assets? - Zealience blog
- What Are Network Assets? - Zealience blog
- Top 15 Essential Open Source Cyber Security Tools for 2025 - Blog post
- Do you Trust your Device? Open Challenges in IoT Security Analysis - Paper
Intro page | EMBA reference |
---|---|
- Industrial Embedded Systems Hardware Penetration Testing Course - Udemy course
- NanoKVM vulnerability report based on EMBA run - Github issue
- One Day Pentest - Post
- Basics of EMBA: A Firmware Analyze Tool for Cybersecurity - Medium article
- Reverse Engineering the Eufy Ecosystem: A Deep Dive into Security Vulnerabilities and Proprietary Protocols - Paper
Intro page | EMBA note |
---|---|
- SET-TOP BOX RE: 6-PART SERIES - Blogpost
- 0xFFF: Understanding Unknown Binaries - Firmware Recon - Blogpost
Main article | Intro with EMBA shoutout |
---|---|
- Firmware Guide for Pen Testers - Blogpost
- Crowdstrike: The Aftermath - PSW #836
PSW in action | EMBA in the PSW |
---|---|
- THIS WEEK IN SECURITY: SNOWFLAKE, THE CVD TENSION, AND KASPERSKY’S EXIT — AND BREAKING BSOD - Hackaday weekly news
News overview | EMBA in the weekly news |
---|---|
- CyMed: A Framework for Testing Cybersecurity of Connected Medical Devices - Paper [EN]
Paper abstract | EMBA in the paper |
---|---|
- ECLYPSIUM TOOLBOX: EXTENDING SUPPLY CHAIN SECURITY TO NEW IT/OT/IOT DEVICES - Blog
Introduction | Eclypsium Toolbox |
---|---|
- ERS0: Enhancing Military Cybersecurity with AI-Driven SBOM for Firmware Vulnerability Detection and Asset Management - Paper / 16th International Conference on Cyber Conflict: Over the Horizon
Introduction | Evaluation of SBOM matching |
---|---|
- Using Open Source and Built-In Tools for Supply Chain Validation - Eclypsium webinar
Analyzing Firmware with EMBA | EMBA Tips and Tricks |
---|---|
- Internet of Things Security: Firmware Approach - Paper
- Corpus Christi: Establishing Replicability when Sharing the Bread is Not Allowed - Paper
- A Crash Course in Hardware Hacking Methodology: The Ones and Zeros - Article
- Packet Protector PP009: Don't Forget the Firmware - Podcast
PP009 | EMBA reference |
---|---|
- 20 essential open-source cybersecurity tools that save you time - Article
Introduction | EMBA reference |
---|---|
- LINUX SUPPLY CHAIN VALIDATION CHEAT SHEET - Blog
Introduction | EMBA reference |
---|---|
- Blackbox-Fuzzing of IoT Devices Using the Router TL-WR902AC as Example - Paper
Introduction | EMBA in the paper |
---|---|
Agenda | EMBA on stage |
---|---|
- SNHACK Attack: How Hackers Could Turn Your Smart Pet Feeder into an All-You-Can-Eat Buffet - Post
Paper intro | EMBA reference |
---|---|
- FITS: Inferring Intermediate Taint Sources for Effective Vulnerability Analysis of IoT Device Firmware - Paper
Paper intro | EMBA reference |
---|---|
- FLATLINED: ANALYZING PULSE SECURE FIRMWARE AND BYPASSING INTEGRITY CHECKING - Blog
Paper intro | EMBA results |
---|---|
- Automated firmware security static analysis tools - Blog
- Multiple vulnerabilities in Lantronix EDS-MD IoT gateway for medical devices - Pentagrid advisory
- Difficulties in Dynamic Analysis of Drone Firmware and Its Solutions - Paper
Paper init | Firmware analysis |
---|---|
Paper init | EMBA intro |
---|---|
- EXPLORING EMBA: UNRAVELING FIRMWARE SECURITY WITH CONFIDENCE by Paul Asadoorian - Link
- HELP NET SECURITY - EMBA: Open-source security analyzer for embedded devices - Link
- Paul's Security Weekly - LogoFAIL, Default Passwords and Android Hacking – PSW #810
- Unveiling Vulnerabilities: A Deep Dive into WiFi Camera Security - Link [EN]
- You can learn some more IoT stuff with EMBA at Hard box training [EN]
- 41 Open-source and Free Vulnerability Scanners For Pentesting and Web App Security - Link [EN]
- BrucCON 0x0F Talk by Nate Warfield - Ghost in the machine - Schedule/Slides/Recording [EN]
Picture from live BruCON (thx to @twallutis) | EMBA on the stream |
---|---|
- Software Bill of Materials (SBOM) in Practice - Link [EN]
- Free IoT Security Seminar by KU Leuven - Web site [EN]
Training overview | EMBA in Walkthrough documentation |
---|---|
- PRACTICAL IOT HACKING Training - Black Hat USA 2023 [EN]
Training overview | EMBA live in class |
---|---|
- Leveraging EMBA for Static Firmware Vulnerability Analysis in Physical Security Products - Blog post [EN]
Our Open-Source Initiative with EMBA | Example report |
---|---|
- Report on Qubo IoT Device Vulnerability (CVE-2023-22906) - Paper [EN]
CVE-2023-22906: Introduction | CVE-2023-22906: EMBA |
---|---|
- ISSA Talk by Nate Warfield - Building on Shaky Ground: Unveiling the Vulnerabilities of Firmware - Schedule/Slides [EN]
EMBA: Overview | EMBA: Vulnerability Research |
---|---|
- VENDOR RE-USE OPENS THE APERTURE ON MANY VULNERABILITIES - Blog post from Nate Warfield [EN]
- Small term paper on the topic of the Internet of Vulnerable Things by Tobias Müller - Hochschule Offenburg Paper/Github page [EN]
- Shmoocon 2023 firetalk by Amit Serper - A 15-minute Crash Course to Building your Own IoT Hacking Lab at Home Schedule/Slides [EN]
Intro | From a binary blob to a Linux filesystem |
---|---|
- DEF CON 30 Talk by Jay Lagorio - Tear Down this Zywall: Breaking Open Zyxel Encrypted Firmware Schedule/Slides/Recording [EN]
DEF CON | EMBA: The future |
---|---|
- How to Search for Vulnerabilities in Embedded Software (June 2021) [EN]
- HackTricks book [EN]
- OWASP Firmware Security Testing Methodology [EN]
- embedsysweekly.com newsletter issue 84 [EN]
- libhunt.com repository summary [EN]
- Summary video AMOS development project for EMBArk [EN]
- Awesome Embedded and IoT Security list [EN]
- IoTSecurity101 [EN]
EMBA - firmware security scanning at its best
Sponsor EMBA and EMBArk:
The EMBA environment is free and open source!
We put a lot of time and energy into these tools and related research to make this happen. It's now possible for you to contribute as a sponsor!
If you like EMBA you have the chance to support future development by becoming a Sponsor
Thank You ❤️ Get a Sponsor
You can also buy us some beer here ❤️ Buy me a coffee
To show your love for EMBA with nice shirts or other merch you can check our Spreadshop
EMBA - firmware security scanning at its best