nccgroup / yocto-whitepaper-examplesLinks
Example code included in the "Improving Your Embedded Linux Security Posture with Yocto" whitepaper
☆17Updated 3 years ago
Alternatives and similar repositories for yocto-whitepaper-examples
Users that are interested in yocto-whitepaper-examples are comparing it to the libraries listed below
Sorting:
- One-Time-Programmable (OTP) fusing tool☆62Updated 2 months ago
- A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to recon…☆290Updated last year
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 10 years ago
- The USB host security assessment tool☆281Updated 6 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆264Updated 3 years ago
- X41 Smartcard Fuzzer☆119Updated 6 years ago
- NCC Group Open Source RF Security Testing Methodology☆90Updated 3 years ago
- lte security☆41Updated 9 years ago
- scripts and examples for using JTAG debug tools to gain root access☆178Updated 9 years ago
- NXP Cryptographic Acceleration and Assurance Module (CAAM) - Linux driver☆46Updated last week
- An example of AES GCM encryption mode using Pycryptodome☆25Updated 4 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆162Updated 7 years ago
- A collection of loosely related OpenEmbedded layers providing several security technologies☆37Updated 3 years ago
- Timing Sidechannel workshop☆29Updated 11 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- An embedded-focused banned.h / strsafe variant intended to assist for Secure Software Development Lifecycle for Embedded Developers☆15Updated 6 years ago
- Vulnerability management tool that provides Yocto SBOM generation and CVE Analysis of target images.☆39Updated this week
- Platform Firmware Auditing Tool☆131Updated 6 years ago
- Tools for timing attacks☆19Updated 9 years ago
- Routines for hunting down kernel symbols.☆82Updated 14 years ago
- GrSecurity and PaX Patches Before End of Public Release☆64Updated 7 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆43Updated 4 years ago
- BLEBoy is a training tool to teach users about BLE security by providing a single BLE peripheral that can be used to experiment with each…☆43Updated 5 years ago
- Linux Kernel Source Tree Reducer☆80Updated 9 months ago
- A tool to help you understand TPM commands and responses.☆45Updated 8 months ago
- RHme+ 2015 challenge☆111Updated 9 years ago
- OWASP IoT Top 10 2018 Mapping Project☆19Updated 5 years ago
- Unofficial gnuk mirror☆19Updated 4 years ago
- Panorama of IoT cyber security regulations across the world☆20Updated 4 months ago
- TPM Genie is an I2C bus interposer for discrete Trusted Platform Modules☆216Updated 4 years ago