HAL – The Hardware Analyzer
-
Updated
Jun 5, 2025 - C++
HAL – The Hardware Analyzer
The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers, consultants, and Information Security professionals with conducting firmware security assessments.
The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility to adapt innovations, and developments in the IoT market while still ensuring comparability of test results.
Openwrt 18.06.5 featured with the Exein's security framework
Awesome list for embedded security tools and knowledge
SIde-Channel Analysis toolKit: embedded security evaluation tools
Platform for automated PCB analysis
E2E Secure Messaging Platform
Implementation of a CAN controller for manipulating on-going CAN traffic.
Proof-of-concept keyboard keystroke interceptor for PS/2 protocol proposed to be used with USB-to-ps/2 downgrade
A centralized repository for technical and cybersecurity white papers published by MottaSec. Each folder contains a distinct white paper along with any relevant supporting materials, tools, or references. This repository serves as a knowledge base reflecting our expertise, research, and thought leadership across key areas of cybersecurity.
Measurement applications for our contribution: A Performance Study of Crypto-Hardware in the Low-end IoT
The documents in this repository summarize the results of the security-related activities performed as part of the Trezor Crypto Wallet Product Security Assessment project for the University of Colorado Embedded Cybersecurity Graduate course.
Microcorruption CTF Writeups
Secure Boot & Firmware Integrity implementation for STM32F4
Nonsecure application development kit based on STM Secure Manager solution. SMAK VS Code integration
Laboratories for Hardware and Embedded Security Exam @ Polito - Materials and supporting documentation for the HES Labs.
Add a description, image, and links to the embedded-security topic page so that developers can more easily learn about it.
To associate your repository with the embedded-security topic, visit your repo's landing page and select "manage topics."