BlackVS / CTFs
My writeups for some CTF I participated
☆9Updated 3 years ago
Alternatives and similar repositories for CTFs:
Users that are interested in CTFs are comparing it to the libraries listed below
- Client side tools to play the CTS contest☆46Updated 3 years ago
- Zigator: A security analysis tool for Zigbee and Thread networks☆29Updated last year
- A firmware base address search tool.☆43Updated 7 months ago
- Minimal UART client in Golang that dumps LPC1343 chips that are locked at CRP1.☆18Updated 3 years ago
- Collection of scripts and how-to for hacking embedded devices☆22Updated 6 months ago
- A curated list of Capture The Signal CTF related stuff☆14Updated 3 years ago
- Hydradancer firmware supporting the Facedancer backend for the Hydradancer dongle and HydraUSB3☆18Updated this week
- CSAW Embedded Security Challenge 2019☆34Updated 5 years ago
- Colin O'Flynn's Hacakday talk at Remoticon 2021 support repo.☆21Updated 3 years ago
- 802.15.4 Fuzzer☆21Updated 5 years ago
- Content related to hardware hacking☆47Updated 5 years ago
- Hardware design files for the PMOD based MUX☆13Updated 5 years ago
- Additional material for our paper "Breaking all the Things - A Systematic Survey of Firmware Extraction Techniques for IoT Devices" (CARD…☆16Updated 5 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Updated 4 years ago
- ☆30Updated 2 months ago
- LEIA: the Lab Embedded ISO7816 Analyzer A Custom Smartcard Reader for the ChipWhisperer PCB☆19Updated 3 years ago
- Launch radare2 like a boss from pwntools in tmux☆22Updated 5 years ago
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- BlueRepli-Plus☆16Updated 4 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- cheap and terrible voltage glitcher hardware/software☆39Updated 5 years ago
- The Dumb Network Fuzzer☆19Updated last year
- BADFET☆44Updated 7 years ago
- Flash-BASH is a Raspberry Pi based tool that uses a multiplexer to "glitch" a target device into a privileged open state.☆23Updated 3 years ago
- A Basic BBI Tool - So Simple, But So Good!☆28Updated 3 years ago
- An architecture independent binary analysis tool for fingerprinting functions through NLP☆12Updated last month
- ☆29Updated 2 years ago
- CPU Adventure 2 challenge from the Dragon CTF 2019☆16Updated 4 years ago
- ☆15Updated 4 years ago
- CSAW Embedded Security Challenge 2020☆26Updated 4 years ago