• ✨Always Use Forum Private Messages PM For Deal With Vendors✨

    Admin Contacts Jabber: megiddo@jabber.sk Telegram: @Megiddo1

TROMMEL

✨ DeeZNuTz

✨ Master ✨
Staff member
Joined
May 15, 2017
Messages
983
Likes
759
Points
1,045
TROMMEL sifts through embedded device files to identify potential vulnerable indicators.
TROMMEL identifies the following indicators related to:

  • Secure Shell (SSH) key files
  • Secure Socket Layer (SSL) key files
  • Internet Protocol (IP) addresses
  • Uniform Resource Locator (URL)
  • email addresses
  • shell scripts
  • web server binaries
  • configuration files
  • database files
  • specific binaries files (i.e. Dropbear, BusyBox, etc.)
  • shared object library files
  • web application scripting variables, and
  • Android application package (APK) file permissions.
TROMMEL has also integrated vFeed which allows for further in-depth vulnerability analysis of identified indicators.

Usage

Code:
trommel.py --help
Output TROMMEL results to a file based on a given directory. By default, only searches plain text files.
Code:
trommel.py -p /directory -o output_file
Output TROMMEL results to a file based on a given directory. Search both binary and plain text files.
Code:
trommel.py -p /directory -o output_file -b
Download Trommel
 
Top Bottom