nccgroup / yocto-whitepaper-examplesLinks
Example code included in the "Improving Your Embedded Linux Security Posture with Yocto" whitepaper
☆17Updated 3 years ago
Alternatives and similar repositories for yocto-whitepaper-examples
Users that are interested in yocto-whitepaper-examples are comparing it to the libraries listed below
Sorting:
- One-Time-Programmable (OTP) fusing tool☆63Updated last month
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 11 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆271Updated 4 years ago
- Platform Firmware Auditing Tool☆131Updated 7 years ago
- Unofficial gnuk mirror☆19Updated 4 years ago
- A collection of loosely related OpenEmbedded layers providing several security technologies☆37Updated 3 years ago
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆65Updated 6 months ago
- An embedded-focused banned.h / strsafe variant intended to assist for Secure Software Development Lifecycle for Embedded Developers☆15Updated 6 years ago
- Tutorials from TPM.dev members☆114Updated last month
- X41 Smartcard Fuzzer☆120Updated 6 years ago
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Updated 5 years ago
- Layer for static code analysis and security hardening☆102Updated 3 weeks ago
- A tool to help you understand TPM commands and responses.☆47Updated 10 months ago
- Vulnerability management tool that provides Yocto SBOM generation and CVE Analysis of target images.☆39Updated last month
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆79Updated 5 years ago
- Linux Kernel Source Tree Reducer☆81Updated 11 months ago
- Embedded AppSec Best Practices☆43Updated this week
- Tools for timing attacks☆19Updated 10 years ago
- GrSecurity and PaX Patches Before End of Public Release☆65Updated 7 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆80Updated 6 years ago
- The USB host security assessment tool☆282Updated 6 years ago
- Frankencert - Adversarial Testing of Certificate Validation in SSL/TLS Implementations☆180Updated 2 years ago
- Small script to determine valid immediate values for ARM assembly☆19Updated 5 years ago
- ☆170Updated 4 years ago
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆49Updated 5 years ago
- ☆12Updated 3 years ago
- free crypto audit☆31Updated 8 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆162Updated 7 years ago
- TLS - what can go wrong?☆108Updated 6 years ago
- lte security☆41Updated 9 years ago