HAL – The Hardware Analyzer
-
Updated
Apr 7, 2026 - C++
HAL – The Hardware Analyzer
The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers, consultants, and Information Security professionals with conducting firmware security assessments.
The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility to adapt innovations, and developments in the IoT market while still ensuring comparability of test results.
Awesome list for embedded security tools and knowledge
Openwrt 18.06.5 featured with the Exein's security framework
SIde-Channel Analysis toolKit: embedded security evaluation tools
Platform for automated PCB analysis
SecureSMX RTOS
😈 Evil Wi-Fi Portal implementation for the M5Stack Core S3
A centralized repository for technical and cybersecurity white papers published by MottaSec. Each folder contains a distinct white paper along with any relevant supporting materials, tools, or references. This repository serves as a knowledge base reflecting our expertise, research, and thought leadership across key areas of cybersecurity.
Deterministic firmware-to-exploit evidence engine. Drop a firmware blob, get hash-anchored findings with SARIF + CycloneDX SBOM + verified exploit chains.
E2E Secure Messaging Platform
DIY PKI server: RK3328 ARM64 (Linux) + STM32 hardware TRNG via USB HID. CA ceremony, X.509 certs, FIPS 140-2 KAT, SDD contracts, REST API. Deployed on real hardware. Educational
Cheap but deadly — Raspberry Pi Pico as a USB Rubber Ducky. DuckyScript payloads, stealth USB mode, web UI on Pico W. No Hak5 needed.
Cybersecurity portfolio showcasing hands-on offensive tools — ESP8266, Raspberry Pi Pico W, Python & Kali Linux.
Implementation of a CAN controller for manipulating on-going CAN traffic.
IoTwizz - A modular IoT security testing framework for hardware hackers, firmware analysts, and IoT security researchers. Features AI-powered assistant, UART debugging, firmware analysis, JTAG/SWD scanning, SPI flashing, and protocol fuzzing.
World's first native C implementation of the SimpleX Messaging Protocol on ESP32-S3. Dedicated encrypted hardware messenger with 5 encryption layers, post-quantum key exchange (sntrup761), Double Ratchet, AES-256-GCM encrypted storage, and multi-core FreeRTOS architecture.
Proof-of-concept keyboard keystroke interceptor for PS/2 protocol proposed to be used with USB-to-ps/2 downgrade
Add a description, image, and links to the embedded-security topic page so that developers can more easily learn about it.
To associate your repository with the embedded-security topic, visit your repo's landing page and select "manage topics."