mirror of
https://github.com/fkie-cad/awesome-embedded-and-iot-security.git
synced 2025-02-08 02:55:26 -05:00
commit
d49f0111fc
15
readme.md
15
readme.md
@ -21,6 +21,7 @@ They are easy to use and you do not need to be an expert to get first meaningful
|
|||||||
- [Analysis Tools](#analysis-tools)
|
- [Analysis Tools](#analysis-tools)
|
||||||
- [Extraction Tools](#extraction-tools)
|
- [Extraction Tools](#extraction-tools)
|
||||||
- [Support Tools](#support-tools)
|
- [Support Tools](#support-tools)
|
||||||
|
- [Misc Tools](#misc-tools)
|
||||||
- [Hardware Tools](#hardware-tools)
|
- [Hardware Tools](#hardware-tools)
|
||||||
- [Books](#books)
|
- [Books](#books)
|
||||||
- [Research Papers](#research-papers)
|
- [Research Papers](#research-papers)
|
||||||
@ -28,6 +29,7 @@ They are easy to use and you do not need to be an expert to get first meaningful
|
|||||||
- [Free Training](#free-training)
|
- [Free Training](#free-training)
|
||||||
- [Websites](#websites)
|
- [Websites](#websites)
|
||||||
- [Blogs](#blogs)
|
- [Blogs](#blogs)
|
||||||
|
- [Tutorials and Technical Background](#tutorials-and-technical-background)
|
||||||
- [Conferences](#conferences)
|
- [Conferences](#conferences)
|
||||||
|
|
||||||
|
|
||||||
@ -68,6 +70,10 @@ Software tools for analyzing embedded/IoT devices and firmware.
|
|||||||
- [JTAGenum](https://github.com/cyphunk/JTAGenum) - Add JTAG capabilities to an Arduino.
|
- [JTAGenum](https://github.com/cyphunk/JTAGenum) - Add JTAG capabilities to an Arduino.
|
||||||
- [OpenOCD](http://openocd.org/) - Free and Open On-Chip Debugging, In-System Programming and Boundary-Scan Testing.
|
- [OpenOCD](http://openocd.org/) - Free and Open On-Chip Debugging, In-System Programming and Boundary-Scan Testing.
|
||||||
|
|
||||||
|
### Misc Tools
|
||||||
|
|
||||||
|
- [Samsung Firmware Magic](https://github.com/chrivers/samsung-firmware-magic) - Decrypt Samsung SSD firmware updates.
|
||||||
|
|
||||||
## Hardware Tools
|
## Hardware Tools
|
||||||
|
|
||||||
- [Bus Blaster](http://dangerousprototypes.com/docs/Bus_Blaster) - Detects and interacts with hardware debug ports like [UART](https://en.wikipedia.org/wiki/Universal_asynchronous_receiver-transmitter) and [JTAG](https://en.wikipedia.org/wiki/JTAG).
|
- [Bus Blaster](http://dangerousprototypes.com/docs/Bus_Blaster) - Detects and interacts with hardware debug ports like [UART](https://en.wikipedia.org/wiki/Universal_asynchronous_receiver-transmitter) and [JTAG](https://en.wikipedia.org/wiki/JTAG).
|
||||||
@ -122,6 +128,7 @@ s](http://www.s3.eurecom.fr/docs/usenixsec14_costin.pdf)
|
|||||||
- [Binary Hardening in IoT products](https://cyber-itl.org/2019/08/26/iot-data-writeup.html)
|
- [Binary Hardening in IoT products](https://cyber-itl.org/2019/08/26/iot-data-writeup.html)
|
||||||
- [Cracking Linksys “Encryption”](http://www.devttys0.com/2014/02/cracking-linksys-crypto/)
|
- [Cracking Linksys “Encryption”](http://www.devttys0.com/2014/02/cracking-linksys-crypto/)
|
||||||
- [Deadly Sins Of Development](https://youtu.be/nXyglaY9N9w) - Conference talk presenting several real world examples on real bad implementations :tv:.
|
- [Deadly Sins Of Development](https://youtu.be/nXyglaY9N9w) - Conference talk presenting several real world examples on real bad implementations :tv:.
|
||||||
|
- [Dumping firmware from a device's SPI flash with a buspirate](https://www.iotpentest.com/2019/06/dumping-firmware-from-device-using.html)
|
||||||
- [Hacking the DSP-W215, Again](http://www.devttys0.com/2014/05/hacking-the-dspw215-again/)
|
- [Hacking the DSP-W215, Again](http://www.devttys0.com/2014/05/hacking-the-dspw215-again/)
|
||||||
- [Hacking the PS4](https://cturt.github.io/ps4.html) - Introduction to PS4's security.
|
- [Hacking the PS4](https://cturt.github.io/ps4.html) - Introduction to PS4's security.
|
||||||
- [Multiple vulnerabilities found in the D-link DWR-932B](https://pierrekim.github.io/blog/2016-09-28-dlink-dwr-932b-lte-routers-vulnerabilities.html)
|
- [Multiple vulnerabilities found in the D-link DWR-932B](https://pierrekim.github.io/blog/2016-09-28-dlink-dwr-932b-lte-routers-vulnerabilities.html)
|
||||||
@ -155,6 +162,14 @@ s](http://www.s3.eurecom.fr/docs/usenixsec14_costin.pdf)
|
|||||||
- [Hackaday](https://hackaday.com)
|
- [Hackaday](https://hackaday.com)
|
||||||
- [jcjc's Hack The World](https://jcjc-dev.com/)
|
- [jcjc's Hack The World](https://jcjc-dev.com/)
|
||||||
- [Quarkslab](https://blog.quarkslab.com/)
|
- [Quarkslab](https://blog.quarkslab.com/)
|
||||||
|
- [wrong baud](https://wrongbaud.github.io/)
|
||||||
|
|
||||||
|
### Tutorials and Technical Background
|
||||||
|
- [Azeria Lab](https://azeria-labs.com/) - Miscellaneous ARM related Tutorials.
|
||||||
|
- [JTAG Explained](https://blog.senr.io/blog/jtag-explained#) - A walkthrough covering UART and JTAG bypassing a protected login shell.
|
||||||
|
- [Reverse Engineering Serial Ports](http://www.devttys0.com/2012/11/reverse-engineering-serial-ports/) - Detailed tutorial about how to spot debug pads on a PCB.
|
||||||
|
- [UART explained](https://www.mikroe.com/blog/uart-serial-communication) - An in depth explanation of the UART protocol.
|
||||||
|
|
||||||
|
|
||||||
## Conferences
|
## Conferences
|
||||||
Conferences focused on embedded and/or IoT security.
|
Conferences focused on embedded and/or IoT security.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user