nccgroup / yocto-whitepaper-examplesLinks
Example code included in the "Improving Your Embedded Linux Security Posture with Yocto" whitepaper
☆17Updated 3 years ago
Alternatives and similar repositories for yocto-whitepaper-examples
Users that are interested in yocto-whitepaper-examples are comparing it to the libraries listed below
Sorting:
- One-Time-Programmable (OTP) fusing tool☆69Updated 3 weeks ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆272Updated 4 years ago
- X41 Smartcard Fuzzer☆120Updated 7 years ago
- Platform Firmware Auditing Tool☆131Updated 7 years ago
- Tools for reverse engineering the Utimaco Firmware☆44Updated 9 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 11 years ago
- Some tools for testing USB devices☆134Updated 13 years ago
- GrSecurity and PaX Patches Before End of Public Release☆65Updated 7 years ago
- Linux Kernel Source Tree Reducer☆81Updated last year
- Stuff from CTF contests☆39Updated 6 years ago
- RHme+ 2015 challenge☆115Updated 9 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 7 years ago
- GDB cheatsheet for reversing binaries☆21Updated 7 years ago
- lte security☆42Updated 10 years ago
- The USB host security assessment tool☆285Updated 7 years ago
- ☆170Updated 4 years ago
- Conferences, tools, papers, etc.☆46Updated 2 months ago
- Unofficial gnuk mirror☆19Updated 4 years ago
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆67Updated last month
- It contains hardenedlinux community documentation.☆60Updated 2 years ago
- An example of AES GCM encryption mode using Pycryptodome☆26Updated 5 years ago
- QNX and BB10 Security Tools☆166Updated 9 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆187Updated 3 years ago
- Panorama of IoT cyber security regulations across the world☆20Updated 9 months ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆82Updated 6 years ago
- TPM Genie is an I2C bus interposer for discrete Trusted Platform Modules☆225Updated 5 years ago
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆48Updated 5 years ago
- scripts and examples for using JTAG debug tools to gain root access☆180Updated 9 years ago
- A simple ISO7816 analyzer that only requires the data-stream.☆61Updated 7 years ago
- Vulnerability management tool that provides Yocto SBOM generation and CVE Analysis of target images.☆38Updated last month