nccgroup / yocto-whitepaper-examples
Example code included in the "Improving Your Embedded Linux Security Posture with Yocto" whitepaper
☆17Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for yocto-whitepaper-examples
- NXP Cryptographic Acceleration and Assurance Module (CAAM) - Linux driver☆43Updated last month
- Tools for reverse engineering the Utimaco Firmware☆43Updated 7 years ago
- An embedded-focused banned.h / strsafe variant intended to assist for Secure Software Development Lifecycle for Embedded Developers☆12Updated 5 years ago
- Vulnerability management tool that provides Yocto SBOM generation and CVE Analysis of target images.☆36Updated 5 months ago
- One-Time-Programmable (OTP) fusing tool☆60Updated last month
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆142Updated 10 years ago
- Files shared in all my home directories☆25Updated 2 months ago
- OWASP Embedded Application Security Project☆16Updated 2 years ago
- A collection of loosely related OpenEmbedded layers providing several security technologies☆36Updated 2 years ago
- ☆21Updated 3 years ago
- X.509 Swiss Army Knife is a toolkit atop OpenSSL to ease generation of CAs and aid white-hat pentesting☆39Updated last year
- TPM subsystem updates for Linux kernel source tree☆20Updated 6 years ago
- Conferences, tools, papers, etc.☆43Updated 2 months ago
- ☆19Updated 2 years ago
- Signing server☆13Updated last week
- A USB armory based USB sandbox☆20Updated 7 years ago
- A few ZigBee Tools to compliment KillerBee☆52Updated 8 years ago
- CANvas is a fast and inexpensive automotive network mapper that can serve as a basis for many other security applications.☆27Updated 4 years ago
- Content related to hardware hacking☆46Updated 5 years ago
- OWASP IoT Top 10 2018 Mapping Project☆16Updated 5 years ago
- a 802.11 wireless fuzzer☆90Updated 11 years ago
- extractor for QNX6 filesystem format.☆23Updated last year
- YAFFS extractor☆45Updated 2 months ago
- Panorama of IoT cyber security regulations across the world☆19Updated last month
- Collection of random files and tools I wrote to assist in reverse engineering and hacking the Withings WS-30 bathroom scale.☆63Updated 9 years ago
- USB armory - hardware control tool☆29Updated last month
- Web of trust grapher☆39Updated 8 months ago
- Embedded AppSec Best Practices☆40Updated last year
- A USB layer firewall for the Linux kernel☆35Updated 6 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆54Updated 6 years ago