nccgroup / yocto-whitepaper-examplesLinks
Example code included in the "Improving Your Embedded Linux Security Posture with Yocto" whitepaper
☆17Updated 3 years ago
Alternatives and similar repositories for yocto-whitepaper-examples
Users that are interested in yocto-whitepaper-examples are comparing it to the libraries listed below
Sorting:
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆272Updated 4 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 11 years ago
- One-Time-Programmable (OTP) fusing tool☆69Updated last month
- X41 Smartcard Fuzzer☆120Updated 6 years ago
- An embedded-focused banned.h / strsafe variant intended to assist for Secure Software Development Lifecycle for Embedded Developers☆15Updated 6 years ago
- Tools for reverse engineering the Utimaco Firmware☆44Updated 8 years ago
- Embedded AppSec Best Practices☆43Updated 2 months ago
- Linux Kernel Source Tree Reducer☆81Updated last year
- A collection of loosely related OpenEmbedded layers providing several security technologies☆37Updated 3 years ago
- ☆17Updated 9 years ago
- An example of AES GCM encryption mode using Pycryptodome☆26Updated 5 years ago
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆48Updated 5 years ago
- Platform Firmware Auditing Tool☆131Updated 7 years ago
- Frankencert - Adversarial Testing of Certificate Validation in SSL/TLS Implementations☆181Updated 2 years ago
- GrSecurity and PaX Patches Before End of Public Release☆65Updated 7 years ago
- The USB host security assessment tool☆285Updated 7 years ago
- Tools for timing attacks☆19Updated 10 years ago
- RHme+ 2015 challenge☆115Updated 9 years ago
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆67Updated last month
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆163Updated 7 years ago
- lte security☆42Updated 10 years ago
- Conferences, tools, papers, etc.☆46Updated last month
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 7 years ago
- free crypto audit☆31Updated 8 years ago
- TPM-Fail Attack code & data☆123Updated 2 years ago
- A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to recon…☆295Updated 2 years ago
- Timing Sidechannel workshop☆30Updated 12 years ago
- Routines for hunting down kernel symbols.☆83Updated 14 years ago
- scripts and examples for using JTAG debug tools to gain root access☆180Updated 9 years ago
- GDB cheatsheet for reversing binaries☆21Updated 6 years ago