nccgroup / yocto-whitepaper-examplesLinks
Example code included in the "Improving Your Embedded Linux Security Posture with Yocto" whitepaper
☆17Updated 3 years ago
Alternatives and similar repositories for yocto-whitepaper-examples
Users that are interested in yocto-whitepaper-examples are comparing it to the libraries listed below
Sorting:
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 11 years ago
- One-Time-Programmable (OTP) fusing tool☆65Updated 2 weeks ago
- Vulnerability management tool that provides Yocto SBOM generation and CVE Analysis of target images.☆39Updated 3 weeks ago
- Unofficial gnuk mirror☆19Updated 4 years ago
- Platform Firmware Auditing Tool☆131Updated 7 years ago
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆48Updated 5 years ago
- An embedded-focused banned.h / strsafe variant intended to assist for Secure Software Development Lifecycle for Embedded Developers☆15Updated 6 years ago
- X41 Smartcard Fuzzer☆120Updated 6 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆272Updated 4 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆163Updated 7 years ago
- Tools for timing attacks☆19Updated 10 years ago
- TPM Genie is an I2C bus interposer for discrete Trusted Platform Modules☆223Updated 4 years ago
- Embedded AppSec Best Practices☆43Updated last month
- NXP Cryptographic Acceleration and Assurance Module (CAAM) - Linux driver☆46Updated 3 months ago
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆66Updated this week
- PASTA: Portable Automotive Security Testbed with Adaptability☆188Updated 3 years ago
- The USB host security assessment tool☆285Updated 7 years ago
- Layer for static code analysis and security hardening☆104Updated this week
- Linux Kernel Source Tree Reducer☆81Updated last year
- A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to recon…☆294Updated last year
- GrSecurity and PaX Patches Before End of Public Release☆65Updated 7 years ago
- An example of AES GCM encryption mode using Pycryptodome☆26Updated 5 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 7 years ago
- TLS - what can go wrong?☆108Updated 7 years ago
- scripts and examples for using JTAG debug tools to gain root access☆179Updated 9 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- OWASP IoT Top 10 2018 Mapping Project☆20Updated 6 years ago
- Private keys that have become public ...☆184Updated 2 weeks ago
- Frankencert - Adversarial Testing of Certificate Validation in SSL/TLS Implementations☆181Updated 2 years ago
- Time Trial - A tool for performing feasibility analyses of timing attacks☆84Updated 11 years ago