All Projects → fkie-cad → Fact_core

fkie-cad / Fact_core

Licence: gpl-3.0
Firmware Analysis and Comparison Tool

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Fact core

Wsltools
Web Scan Lazy Tools - Python Package
Stars: ✭ 288 (-56.56%)
Mutual labels:  security-automation
W5
Security Orchestration, Automation and Response (SOAR) Platform. 安全编排与自动化响应平台,无需编写代码的安全自动化,使用 SOAR 可以让团队工作更加高效
Stars: ✭ 367 (-44.65%)
Mutual labels:  security-automation
Gosec
Golang security checker
Stars: ✭ 5,694 (+758.82%)
Mutual labels:  security-automation
Shodansploit
🔎 shodansploit > v1.3.0
Stars: ✭ 342 (-48.42%)
Mutual labels:  security-automation
Taipan
Web application vulnerability scanner
Stars: ✭ 359 (-45.85%)
Mutual labels:  security-automation
Huskyci
Performing security tests inside your CI
Stars: ✭ 398 (-39.97%)
Mutual labels:  security-automation
Faraday
Faraday introduces a new concept - IPE (Integrated Penetration-Test Environment) a multiuser Penetration test IDE. Designed for distributing, indexing, and analyzing the data generated during a security audit.
Stars: ✭ 3,198 (+382.35%)
Mutual labels:  security-automation
Yasuo
A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
Stars: ✭ 517 (-22.02%)
Mutual labels:  security-automation
Patrowlmanager
PatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform
Stars: ✭ 363 (-45.25%)
Mutual labels:  security-automation
Shuffle
Shuffle: A general purpose security automation platform platform. We focus on accessibility for all.
Stars: ✭ 424 (-36.05%)
Mutual labels:  security-automation
Super
Secure, Unified, Powerful and Extensible Rust Android Analyzer
Stars: ✭ 340 (-48.72%)
Mutual labels:  security-automation
Trailscraper
A command-line tool to get valuable information out of AWS CloudTrail
Stars: ✭ 352 (-46.91%)
Mutual labels:  security-automation
Ansible Lockdown
Ansible playbook roles for security
Stars: ✭ 424 (-36.05%)
Mutual labels:  security-automation
Burpdeveltraining
Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"
Stars: ✭ 302 (-54.45%)
Mutual labels:  security-automation
Penetration Testing Study Notes
Penetration Testing notes, resources and scripts
Stars: ✭ 461 (-30.47%)
Mutual labels:  security-automation
Securecodebox
secureCodeBox (SCB) - continuous secure delivery out of the box
Stars: ✭ 279 (-57.92%)
Mutual labels:  security-automation
Fwanalyzer
a tool to analyze filesystem images for security
Stars: ✭ 382 (-42.38%)
Mutual labels:  security-automation
Monkey
Infection Monkey - An automated pentest tool
Stars: ✭ 5,572 (+740.42%)
Mutual labels:  security-automation
Turbinia
Automation and Scaling of Digital Forensics Tools
Stars: ✭ 461 (-30.47%)
Mutual labels:  security-automation
Burpa
Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Application Security Testing (DAST).
Stars: ✭ 427 (-35.6%)
Mutual labels:  security-automation

FACT Logo

The Firmware Analysis and Comparison Tool (FACT)

codecov BCH compliance Codacy Badge Gitter chat

The Firmware Analysis and Comparison Tool (formerly known as Fraunhofer's Firmware Analysis Framework (FAF)) is intended to automate most of the firmware analysis process. It unpacks arbitrary firmware files and processes several analysis. Additionally, it can compare several images or single files.
Furthermore, Unpacking, analysis and compares are based on plug-ins guaranteeing maximal flexibility and expandability.
More details and some screenshots can be found on our project page.

Requirements

FACT is designed as a multiprocess application, the more Cores and RAM, the better.

Minimal Recommended Software
4 Cores
8GB RAM
10 GB disk space
16 Cores
64GB RAM
10* GB disk space
git
python 3.5 - 3.8
OS see below

~ 10 GB required to set up FACT code, container and binaries. Additional space is necessary for result storage. That can be on a separate partition or drive.

It is possible to install FACT on any Linux distribution but the installer is limited to

  • Ubuntu 16.04, 18.04, 20.04 (stable)
    • Deprecation warning: Ubuntu 16.04 support will be discontinued when Python 3.5 hits its End of Life in 09/2020
  • Ubuntu 19.04 (experimental)
  • Debian 9, 10 (experimental)
  • Kali (tested on 2019.3 and 2019.4) (experimental)

❗️ Caution: FACT is not intended to be used as public internet service. The GUI is not a hardened WEB-application and it may take your server at risk!

Installation

The installation is generally wrapped in a single script. Some features can be selected specifically though. See INSTALL.md for details.

Usage

You can start FACT by executing the start_all_installed_fact_components scripts. The script detects all installed components automatically.

$ ./start_all_installed_fact_components

Afterwards FACT can be accessed on http://localhost:5000 and https://localhost (nginx), respectively.

You can shutdown the system by pressing Ctrl + c or by sending a SIGTERM to the start_all_installed_fact_components script.

Advanced Usage

🔥 We're currently working to improving our documentation, including installation, getting started and alike. Follow progress on our wiki pages. ✌️

REST API

FACT provides a REST API. More information can be found here.

User Management

FACT provides an optional basic authentication, role and user management. More information can be found here.

List of available community plug-ins and REST scripts

Contribute

The easiest way to contribute is writing your own plug-in. Our Developers Manual can be found here.

Acknowledgments

This project is partly financed by German Federal Office for Information Security (BSI) and others.

Publications / Presentations

BlackHat Arsenal

We've been happy to show FACT in a number of BlackHat Arsenal sessions.

  • Black Hat Arsenal
  • Black Hat Arsenal
  • Black Hat Arsenal

Other

License

    Firmware Analysis and Comparison Tool (FACT)
    Copyright (C) 2015-2020  Fraunhofer FKIE

    This program is free software: you can redistribute it and/or modify
    it under the terms of the GNU General Public License as published by
    the Free Software Foundation, either version 3 of the License, or
    (at your option) any later version.

    This program is distributed in the hope that it will be useful,
    but WITHOUT ANY WARRANTY; without even the implied warranty of
    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
    GNU General Public License for more details.

    You should have received a copy of the GNU General Public License
    along with this program.  If not, see <http://www.gnu.org/licenses/>.
    
    Some plug-ins may have different licenses. If so, a license file is provided in the plug-in's folder.
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].