Difference between revisions of "Hardware Exploits"
| (One intermediate revision by one other user not shown) | |||
| Line 4: | Line 4: | ||
[[Apex Microelectronics Exploits|Apex Microelectronics (APM)]]<br> | [[Apex Microelectronics Exploits|Apex Microelectronics (APM)]]<br> | ||
[[Atmel Exploits|Atmel (AT)]]<br> | [[Atmel Exploits|Atmel (AT)]]<br> | ||
| − | [[China Key System Exploits|China Key System (CKS)]] | + | [[China Key System Exploits|China Key System (CKS)]]<br> |
[[GigaDevice Exploits|GigaDevice (GD)]]<br> | [[GigaDevice Exploits|GigaDevice (GD)]]<br> | ||
[[Microchip Exploits|Microchip]]<br> | [[Microchip Exploits|Microchip]]<br> | ||
[[STMicroelectronics Exploits|STMicroelectronics (STM)]]<br> | [[STMicroelectronics Exploits|STMicroelectronics (STM)]]<br> | ||
| + | [[Renesas Exploits|Renesas]] | ||
Latest revision as of 19:42, 4 July 2025
Exploits in hardware used to extract firmware or gain debug access to locked microcontrollers.