OWASP / www-project-embedded-application-security
OWASP Embedded Application Security Project
☆16Updated 3 years ago
Alternatives and similar repositories for www-project-embedded-application-security
Users that are interested in www-project-embedded-application-security are comparing it to the libraries listed below
Sorting:
- ☆28Updated 2 weeks ago
- Exercises for (legacy) Computer Security course in the University of Oulu☆45Updated last year
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆13Updated 4 years ago
- Embedded AppSec Best Practices☆41Updated last year
- A community collection of security reviews of open source software components.☆93Updated last year
- Hardware design files for the PMOD based MUX☆13Updated 5 years ago
- Zigator: A security analysis tool for Zigbee and Thread networks☆32Updated last year
- Content related to hardware hacking☆51Updated 6 years ago
- A framework for parsing binary data.☆17Updated 2 years ago
- CITL's static analysis engine for native code artifacts☆20Updated 4 years ago
- Advanced: Bluetooth low energy capture the flag☆57Updated last year
- Panorama of IoT cyber security regulations across the world☆22Updated last month
- Security Project☆88Updated 2 years ago
- A command line utility to interact and query the Centrifuge API.☆16Updated last year
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- Timing Sidechannel workshop☆29Updated 11 years ago
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆47Updated 4 years ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆87Updated 2 years ago
- ☆32Updated 5 years ago
- Conferences, tools, papers, etc.☆43Updated last week
- ☆21Updated 4 years ago
- Colin O'Flynn's Hacakday talk at Remoticon 2021 support repo.☆22Updated 3 years ago
- Additional material for our paper "Breaking all the Things - A Systematic Survey of Firmware Extraction Techniques for IoT Devices" (CARD…☆16Updated 5 years ago
- Pattern recognition for hosts, services, and content☆13Updated 2 years ago
- Finds the base address of a firmware by comparing string addresses with target pointer addresses☆45Updated 2 months ago
- nü-map: a somewhat-more-modern (expeirmental) derivative of umap2 for modern FaceDancer☆26Updated last year
- A Tamarin model and analysis of EMV☆31Updated 4 years ago
- Research project on heterogeneous IoT protocols modelling☆54Updated 3 years ago
- Binary exploitation CTF challenge☆24Updated 6 years ago
- ☆30Updated 4 years ago