Difference between revisions of "Hardware Exploits"
| (2 intermediate revisions by one other user not shown) | |||
| Line 2: | Line 2: | ||
Exploits in hardware used to extract firmware or gain debug access to locked microcontrollers. | Exploits in hardware used to extract firmware or gain debug access to locked microcontrollers. | ||
==Manufacturer Index== | ==Manufacturer Index== | ||
| − | [[Atmel Exploits|Atmel]]<br> | + | [[Apex Microelectronics Exploits|Apex Microelectronics (APM)]]<br> |
| + | [[Atmel Exploits|Atmel (AT)]]<br> | ||
| + | [[China Key System Exploits|China Key System (CKS)]]<br> | ||
| + | [[GigaDevice Exploits|GigaDevice (GD)]]<br> | ||
[[Microchip Exploits|Microchip]]<br> | [[Microchip Exploits|Microchip]]<br> | ||
| − | [[STMicroelectronics Exploits|STMicroelectronics]]<br> | + | [[STMicroelectronics Exploits|STMicroelectronics (STM)]]<br> |
| + | [[Renesas Exploits|Renesas]] | ||
Latest revision as of 19:42, 4 July 2025
Exploits in hardware used to extract firmware or gain debug access to locked microcontrollers.