{"id":31786321,"url":"https://github.com/cybersecurity-dev/arm-embedded-toolkit","last_synced_at":"2026-02-17T16:01:08.044Z","repository":{"id":290554100,"uuid":"974835539","full_name":"cybersecurity-dev/ARM-Embedded-Toolkit","owner":"cybersecurity-dev","description":"ARM based Embedded Device Toolkit","archived":false,"fork":false,"pushed_at":"2025-04-29T11:35:23.000Z","size":10,"stargazers_count":1,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-10-10T12:54:02.680Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":null,"language":null,"has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/cybersecurity-dev.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null}},"created_at":"2025-04-29T11:32:32.000Z","updated_at":"2025-08-14T13:56:00.000Z","dependencies_parsed_at":"2025-04-29T12:50:41.932Z","dependency_job_id":"5e7afc2f-7a56-46e1-86e6-7598d19a0491","html_url":"https://github.com/cybersecurity-dev/ARM-Embedded-Toolkit","commit_stats":null,"previous_names":["cybersecurity-dev/arm-embedded-toolkit"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/cybersecurity-dev/ARM-Embedded-Toolkit","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cybersecurity-dev%2FARM-Embedded-Toolkit","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cybersecurity-dev%2FARM-Embedded-Toolkit/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cybersecurity-dev%2FARM-Embedded-Toolkit/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cybersecurity-dev%2FARM-Embedded-Toolkit/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/cybersecurity-dev","download_url":"https://codeload.github.com/cybersecurity-dev/ARM-Embedded-Toolkit/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cybersecurity-dev%2FARM-Embedded-Toolkit/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":29549204,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-02-17T14:33:00.708Z","status":"ssl_error","status_checked_at":"2026-02-17T14:32:58.657Z","response_time":100,"last_error":"SSL_connect returned=1 errno=0 peeraddr=140.82.121.5:443 state=error: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2025-10-10T12:51:31.882Z","updated_at":"2026-02-17T16:01:08.039Z","avatar_url":"https://github.com/cybersecurity-dev.png","language":null,"readme":"\u003cdiv align=\"center\"\u003e\n\n# **`ARM`** based Embedded Device Toolkit\n\u003c/div\u003e\n\n[![YouTube](https://img.shields.io/badge/YouTube-%23FF0000.svg?style=for-the-badge\u0026logo=YouTube\u0026logoColor=white)]()\n[![Reddit](https://img.shields.io/badge/Reddit-FF4500?style=for-the-badge\u0026logo=reddit\u0026logoColor=white)]()\n\nThe **ARM** (_Advanced RISC Machines_) architecture is a family of **RISC** (_Reduced Instruction Set Computing_) architectures for computer processors. Developed by Arm Holdings, it has become the most pervasive processor architecture globally, found in a vast range of devices from tiny sensors and wearables to smartphones, tablets, embedded systems, and increasingly, servers and even some laptops.\n\u003cp align=\"center\"\u003e\n    \u003ca href=\"https://github.com/cybersecurity-dev/\"\u003e\u003cimg height=\"25\" src=\"https://github.com/cybersecurity-dev/cybersecurity-dev/blob/main/assets/github.svg\" alt=\"GitHub\"\u003e\u003c/a\u003e\n    \u0026nbsp;\n    \u003ca href=\"https://www.youtube.com/@CyberThreatDefence\"\u003e\u003cimg height=\"25\" src=\"https://github.com/cybersecurity-dev/cybersecurity-dev/blob/main/assets/youtube.svg\" alt=\"YouTube\"\u003e\u003c/a\u003e\n    \u0026nbsp;\n    \u003ca href=\"https://cyberthreatdefence.com/my_awesome_lists\"\u003e\u003cimg height=\"20\" src=\"https://github.com/cybersecurity-dev/cybersecurity-dev/blob/main/assets/blog.svg\" alt=\"My Awesome Lists\"\u003e\u003c/a\u003e\n    \u003cimg src=\"https://github.com/cybersecurity-dev/cybersecurity-dev/blob/main/assets/bar.gif\"\u003e\n\u003c/p\u003e\n\n| Feature             | MIPS (Microprocessor without Interlocked Pipeline Stages) | ARM (Advanced RISC Machines) |\n|----------------------|---------------------------------------------------------|-----------------------------|\n| **Instruction Set** | Primarily 32-bit fixed length, load-store architecture | Variable length (mostly 32-bit, with 16-bit Thumb) |\n| **Instruction Format**| Fewer formats (R, I, J types)                          | More complex and numerous formats |\n| **Registers** | 32 general-purpose registers                           | Up to 32 general-purpose registers (32-bit or 64-bit) |\n| **Addressing Modes** | Simpler addressing modes                               | More complex and flexible addressing modes |\n| **Execution** | Focus on single-cycle execution for most instructions   | Emphasis on low power consumption and efficiency |\n| **Branching** | Delayed branches                                        | Conditional execution of many instructions |\n| **Data Alignment** | Strict data alignment requirements                      | More flexible data alignment |\n| **Endianness** | Configurable (Big or Little Endian)                     | Bi-endian (configurable, often Little Endian by default) |\n| **History \u0026 Usage** | Historically used in embedded systems, networking, workstations; popular for teaching RISC concepts | Dominant in mobile devices, embedded systems, and increasingly in servers and desktops |\n| **SIMD Extensions** | MIPS-3D, MDMX                                           | NEON, SVE, SVE2               |\n| **Power Consumption** | Generally higher                                        | Generally lower                 |\n| **Complexity** | Simpler instruction set and architecture               | More complex instruction set and architecture |\n\n##\n\n### My Awesome Lists\nYou can access the my awesome lists [here](https://cyberthreatdefence.com/my_awesome_lists)\n\n### Contributing\n\n[Contributions of any kind welcome, just follow the guidelines](contributing.md)!\n\n### Contributors\n\n[Thanks goes to these contributors](https://github.com/cybersecurity-dev/ARM-Embedded-Toolkit/graphs/contributors)!\n\n[🔼 Back to top](#arm-based-embedded-device-toolkit)\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcybersecurity-dev%2Farm-embedded-toolkit","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fcybersecurity-dev%2Farm-embedded-toolkit","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcybersecurity-dev%2Farm-embedded-toolkit/lists"}