Senrio on Twitter: "The Shikra (https://t.co/zB30To5h0u) has arrived for : http://t.co/ZUbqUXrG48 No embedded devices are safe. http://t.co/bZWyImRXEu" / Twitter
The Shikra | int3.cc
JTAG on-chip debugging: Extracting passwords from memory | Portcullis Labs
Using the Shikra to Attack Embedded Systems: Getting Started
The Introductory IoT Hardware Hacking Tool Box | by Sam Levin | Independent Security Evaluators
Hardware Hacking with Shikra - Black Hills Information Security
Intro to IOT Hardware Hacking. When we talk about hardware hacking —… | by ZeusCybersec | Medium
Assessing the security of a portable router: a look inside its hardware, part deux | Malwarebytes Labs