41 results for “topic:embedded-security”
HAL – The Hardware Analyzer
The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers, consultants, and Information Security professionals with conducting firmware security assessments.
The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility to adapt innovations, and developments in the IoT market while still ensuring comparability of test results.
Awesome list for embedded security tools and knowledge
Openwrt 18.06.5 featured with the Exein's security framework
SIde-Channel Analysis toolKit: embedded security evaluation tools
Platform for automated PCB analysis
SecureSMX RTOS
😈 Evil Wi-Fi Portal implementation for the M5Stack Core S3
A centralized repository for technical and cybersecurity white papers published by MottaSec. Each folder contains a distinct white paper along with any relevant supporting materials, tools, or references. This repository serves as a knowledge base reflecting our expertise, research, and thought leadership across key areas of cybersecurity.
E2E Secure Messaging Platform
The repo containing all the research works done for the CSAW Challenge '18
Cheap but deadly — Raspberry Pi Pico as a USB Rubber Ducky. DuckyScript payloads, stealth USB mode, web UI on Pico W. No Hak5 needed.
Implementation of a CAN controller for manipulating on-going CAN traffic.
IoTwizz - A modular IoT security testing framework for hardware hackers, firmware analysts, and IoT security researchers. Features AI-powered assistant, UART debugging, firmware analysis, JTAG/SWD scanning, SPI flashing, and protocol fuzzing.
Cybersecurity portfolio showcasing hands-on offensive tools — ESP8266, Raspberry Pi Pico W, Python & Kali Linux.
Proof-of-concept keyboard keystroke interceptor for PS/2 protocol proposed to be used with USB-to-ps/2 downgrade
A playground for post-quantum cryptography (PQC) on embedded systems and edge devices
The documents in this repository summarize the results of the security-related activities performed as part of the Trezor Crypto Wallet Product Security Assessment project for the University of Colorado Embedded Cybersecurity Graduate course.
Measurement applications for our contribution: A Performance Study of Crypto-Hardware in the Low-end IoT
A conceptual "herd immunity" protocol for a secure and interoperable IoT ecosystem
shake out hardcoded keys, certificates and other artifacts from firmware
Comprehensive hands-on labs on hardware security: Side-Channel Analysis (SPA/DPA/CPA) and Fault Injection (Clock Glitching) on ARM Cortex-M4 using ChipWhisperer platform.
An open-source encrypted communication and IoT platform for dedicated hardware.
Microcorruption CTF Writeups
Leviathan OS v 0.2.0 alpha - Industrial-Grade Security Audit Firmware
Arduino ve RC522 RFID modülü kullanarak temassız kart okuma/yazma uygulaması. Kapı kontrol sistemleri, personel takibi ve güvenlik projeleri için temel bir başlangıç.
Presidio security-hardened ESP-IDF component for ESP32 in smart home and industrial IoT
Secure Boot & Firmware Integrity implementation for STM32F4
Implementation of Fast and Lightweight RSA (FLRSA) signature for JCOP J3R180 smart cards. Features 1024-bit optimized arithmetic using JCMathLib and cubic expansion formula.