syncsrc / jtagsploitation
scripts and examples for using JTAG debug tools to gain root access
☆177Updated 9 years ago
Alternatives and similar repositories for jtagsploitation:
Users that are interested in jtagsploitation are comparing it to the libraries listed below
- A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to recon…☆287Updated last year
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆256Updated 3 years ago
- The USB host security assessment tool☆276Updated 6 years ago
- scripts and examples for using JTAG debug tools to gain root access☆27Updated 8 years ago
- Database of private SSL/SSH keys for embedded devices☆256Updated last year
- Purposely Vulnerable Embedded Device