Difference between revisions of "Hardware Exploits"

From RECESSIM, A Reverse Engineering Community
Jump to navigation Jump to search
(Created page with "thumb|Equipment typically used while exploiting hardware. Exploits in hardware typically used to extract firmware or gain debug access...")
 
 
(4 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
[[File:Lab Bench Hardware Exploit.jpg|thumb|Equipment typically used while exploiting hardware.]]
 
[[File:Lab Bench Hardware Exploit.jpg|thumb|Equipment typically used while exploiting hardware.]]
Exploits in hardware typically used to extract firmware or gain debug access to locked microcontrollers organized by manufacturer.
+
Exploits in hardware used to extract firmware or gain debug access to locked microcontrollers.
 
==Manufacturer Index==
 
==Manufacturer Index==
 +
[[Apex Microelectronics Exploits|Apex Microelectronics (APM)]]<br>
 +
[[Atmel Exploits|Atmel (AT)]]<br>
 +
[[China Key System Exploits|China Key System (CKS)]]<br>
 +
[[GigaDevice Exploits|GigaDevice (GD)]]<br>
 +
[[Microchip Exploits|Microchip]]<br>
 +
[[STMicroelectronics Exploits|STMicroelectronics (STM)]]<br>

Latest revision as of 22:16, 22 June 2023

Equipment typically used while exploiting hardware.

Exploits in hardware used to extract firmware or gain debug access to locked microcontrollers.

Manufacturer Index

Apex Microelectronics (APM)
Atmel (AT)
China Key System (CKS)
GigaDevice (GD)
Microchip
STMicroelectronics (STM)