nccgroup / yocto-whitepaper-examplesLinks
Example code included in the "Improving Your Embedded Linux Security Posture with Yocto" whitepaper
☆17Updated 3 years ago
Alternatives and similar repositories for yocto-whitepaper-examples
Users that are interested in yocto-whitepaper-examples are comparing it to the libraries listed below
Sorting:
- One-Time-Programmable (OTP) fusing tool☆63Updated last week
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 10 years ago
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆65Updated 4 months ago
- TPM Genie is an I2C bus interposer for discrete Trusted Platform Modules☆218Updated 4 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆265Updated 3 years ago
- TPM-Fail Attack code & data☆122Updated 2 years ago
- A collection of loosely related OpenEmbedded layers providing several security technologies☆37Updated 3 years ago
- Tutorials from TPM.dev members☆112Updated last year
- X41 Smartcard Fuzzer☆119Updated 6 years ago
- lte security☆41Updated 9 years ago
- Platform Firmware Auditing Tool☆131Updated 6 years ago
- Tools for timing attacks☆19Updated 9 years ago
- An example of AES GCM encryption mode using Pycryptodome☆25Updated 5 years ago
- The USB host security assessment tool☆281Updated 6 years ago
- scripts and examples for using JTAG debug tools to gain root access☆178Updated 9 years ago
- Unofficial gnuk mirror☆19Updated 4 years ago
- A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to recon…☆293Updated last year
- GDB cheatsheet for reversing binaries☆21Updated 6 years ago
- Vulnerability management tool that provides Yocto SBOM generation and CVE Analysis of target images.☆39Updated this week
- NXP Cryptographic Acceleration and Assurance Module (CAAM) - Linux driver☆46Updated last week
- Panorama of IoT cyber security regulations across the world☆20Updated 5 months ago
- Files shared in all my home directories☆28Updated 5 months ago
- It contains hardenedlinux community documentation.☆60Updated last year
- Tools for reverse engineering the Utimaco Firmware☆44Updated 8 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆162Updated 7 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 7 years ago
- Small script to determine valid immediate values for ARM assembly☆19Updated 5 years ago
- GrSecurity and PaX Patches Before End of Public Release☆64Updated 7 years ago
- Time Trial - A tool for performing feasibility analyses of timing attacks☆83Updated 11 years ago
- Conferences, tools, papers, etc.☆43Updated 2 months ago