nccgroup / yocto-whitepaper-examples
Example code included in the "Improving Your Embedded Linux Security Posture with Yocto" whitepaper
☆17Updated 3 years ago
Alternatives and similar repositories for yocto-whitepaper-examples:
Users that are interested in yocto-whitepaper-examples are comparing it to the libraries listed below
- Vulnerability management tool that provides Yocto SBOM generation and CVE Analysis of target images.☆37Updated this week
- NXP Cryptographic Acceleration and Assurance Module (CAAM) - Linux driver☆46Updated 2 months ago
- One-Time-Programmable (OTP) fusing tool☆60Updated last week
- Signing server☆14Updated 2 weeks ago
- A Yocto meta-layer for generating CycloneDX SBOMs and automatically uploading them to Dependency Track.☆20Updated 11 months ago
- Scripts to build the Linux kernel from a config file and initrd from a list of programs☆22Updated 2 years ago
- A collection of loosely related OpenEmbedded layers providing several security technologies☆36Updated 2 years ago
- A tool to help you understand TPM commands and responses.☆42Updated 4 months ago
- A tiny tool for embedding CoSWID tags in EFI binaries☆22Updated 2 weeks ago
- Layer for static code analysis and security hardening☆95Updated this week
- An embedded-focused banned.h / strsafe variant intended to assist for Secure Software Development Lifecycle for Embedded Developers☆15Updated 5 years ago
- X.509 Swiss Army Knife is a toolkit atop OpenSSL to ease generation of CAs and aid white-hat pentesting☆40Updated last year
- Automated Flasher Tester☆35Updated 2 years ago
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆47Updated 4 years ago
- OpenEmbedded layer for the use cases on secure boot, integrity and encryption☆82Updated 2 years ago
- Panorama of IoT cyber security regulations across the world☆21Updated 3 weeks ago
- Files shared in all my home directories☆25Updated 3 weeks ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆37Updated last year
- OWASP Embedded Application Security Project☆16Updated 3 years ago
- ☆20Updated last year
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆142Updated 10 years ago
- A tool for characterizing the network behavior of IoT Devices. The primary intended use is to assist in the generation of allowlist files…☆23Updated last year
- Tutorials from TPM.dev members☆104Updated 9 months ago
- Linux Kernel Source Tree Reducer☆80Updated 5 months ago
- TPM subsystem updates for Linux kernel source tree☆22Updated 6 years ago
- A few ZigBee Tools to compliment KillerBee☆53Updated 8 years ago
- Embedded AppSec Best Practices☆40Updated last year
- Verified Boot for RPi3☆15Updated 3 years ago
- USB armory - hardware control tool☆29Updated 2 months ago
- Tools for reverse engineering the Utimaco Firmware☆44Updated 8 years ago