Difference between revisions of "Hardware Exploits"

From RECESSIM, A Reverse Engineering Community
Jump to navigation Jump to search
 
(2 intermediate revisions by the same user not shown)
Line 2: Line 2:
 
Exploits in hardware used to extract firmware or gain debug access to locked microcontrollers.
 
Exploits in hardware used to extract firmware or gain debug access to locked microcontrollers.
 
==Manufacturer Index==
 
==Manufacturer Index==
[[Atmel Exploits|Atmel]]
+
[[Apex Microelectronics Exploits|Apex Microelectronics (APM)]]<br>
[[Microchip Exploits|Microchip]]
+
[[Atmel Exploits|Atmel (AT)]]<br>
[[STMicroelectronics Exploits|STMicroelectronics]]
+
[[China Key System Exploits|China Key System (CKS)]]<br>
 +
[[GigaDevice Exploits|GigaDevice (GD)]]<br>
 +
[[Microchip Exploits|Microchip]]<br>
 +
[[STMicroelectronics Exploits|STMicroelectronics (STM)]]<br>

Latest revision as of 22:16, 22 June 2023

Equipment typically used while exploiting hardware.

Exploits in hardware used to extract firmware or gain debug access to locked microcontrollers.

Manufacturer Index

Apex Microelectronics (APM)
Atmel (AT)
China Key System (CKS)
GigaDevice (GD)
Microchip
STMicroelectronics (STM)