CERT-Polska / phobos-cuda-decryptor-poc
☆69Updated last year
Alternatives and similar repositories for phobos-cuda-decryptor-poc:
Users that are interested in phobos-cuda-decryptor-poc are comparing it to the libraries listed below
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆100Updated 11 months ago
- Filesystems that cause an OS panic☆13Updated 4 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆57Updated last year
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆95Updated this week
- Arbitrary Speculative Code Execution with Return Instructions☆157Updated last year
- iTLB multihit PoC☆40Updated last year
- ☆24Updated 9 months ago
- ☆112Updated last year
- LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems (ACSAC 2021)☆67Updated 3 years ago
- Paused mirror. Official repository at https://git.glasklar.is/system-transparency/core/stboot☆111Updated last year
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 2 years ago
- Research and proof of concept to develop the next SecureDrop with end to end encryption.☆48Updated this week
- A tool to help you understand TPM commands and responses.☆36Updated last month
- The first analysis framework for CPU microcode☆375Updated last year
- ☆112Updated last year
- ☆30Updated 2 years ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆105Updated last year
- Code used in blog posts☆33Updated 6 months ago
- Intel Management Engine JTAG Proof of Concept☆141Updated 4 years ago
- playing with DDR DRAM bus fault injection☆88Updated 3 months ago
- ☆94Updated last year
- XZ backdoor reverse engineering☆91Updated 5 months ago
- Silly proof-of-concept for a PDF chatroom☆21Updated last year
- F-Secure Armory Drive - USB encrypted drive with mobile unlock over BLE☆53Updated 2 weeks ago
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆139Updated 3 years ago
- ☆93Updated this week
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated 10 months ago
- SHA256 sentence: discover a SHA256 checksum that matches a sentence's description of hex digit words.☆21Updated last year
- Determine which CPU architecture is used in a binary file.☆111Updated 10 months ago
- An eBPF detection program for CVE-2022-0847☆28Updated 2 years ago