Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.Sign up
- i.MX53 Reference Manual
- i.MX53xD Datasheet
- i.MX53 System Development User's Guide
- i.MX53 Secure Boot Application Note
Jeroen van Kessel and Nick Petros Triantafyllidis authored a paper titled [USB Armory as an Offensive Attack Platform](contrib/USB Armory as an Offensive Attack Platform Jeroen_van_Kessel-and-Nick_Triantafyllidis.pdf), exploring implementation of DNS hijacking and traffic diversion attacks...BadUSB style.
Roland Schilling, Frieder Steinmetz authored a paper titled USB devices phoning home, exploring data leaks through rogue HTTP channels established by malicious USB devices and using the USB armory for attack implementation. The repository with the PoC is available here.
Matthias Neugschwandtner, Anton Beitler, Anil Kurmus authored A Transparent Defense Against USB Eavesdropping Attacks, a research which explores passive USB sniffing and countermeasures using the USB armory as evaluation platform.
Mubix “Rob” Fuller wrote a step by step guide titled "Snagging creds from locked machines" that illustrates how to use the USB armory to capture credential hashes on certain Windows and OS X versions, even when locked out.