CERT-Polska / phobos-cuda-decryptor-pocLinks
☆70Updated 2 years ago
Alternatives and similar repositories for phobos-cuda-decryptor-poc
Users that are interested in phobos-cuda-decryptor-poc are comparing it to the libraries listed below
Sorting:
- ☆129Updated 3 years ago
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆124Updated 2 months ago
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- iTLB multihit PoC☆42Updated 2 years ago
- ☆118Updated 2 years ago
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆104Updated last year
- A tasty cross-platform tool from Blacksea to debug shellcode!☆92Updated 2 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated 2 years ago
- ☆35Updated last year
- Playing NES ROMs with Ghidra's PCode Emulator☆102Updated 2 years ago
- Code used in blog posts☆34Updated 8 months ago
- CLI tool, Ghidra plug-in, and Haskell library for analyzing binaries using under-constrained symbolic execution☆126Updated this week
- Detecting Inconsistencies in Feature or Function Evaluations of Requirements☆68Updated last year
- PageBuster - dump all executable pages of packed processes.☆204Updated 4 years ago
- Filesystems that cause an OS panic☆13Updated 5 years ago
- IPC scripts for access to Intel CRBUS☆120Updated 4 years ago
- ☆113Updated 2 years ago
- My Analysis of the VC4 Assembly Code from the RPI4☆37Updated 11 months ago
- Slapped-together tools to reprogram the BIOS on a bricked HP Envy laptop.☆25Updated 4 years ago
- Security payload for next-Gen firmware architecture☆59Updated 8 months ago
- LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems (ACSAC 2021)☆68Updated 4 years ago
- Utility to find hidden Linux kernel modules☆146Updated 6 months ago
- A network forensics and passive sniffer tool☆50Updated last week
- ugly code to check linux kernel memory and dump some internal structures☆48Updated last year
- Thunderclap QEMU-based network card emulation☆29Updated 3 years ago
- Exploiting Linksys WRT54G using a vulnerability I found.☆37Updated 4 years ago
- Emulate Apache NuttX RTOS for Arm64 with Unicorn Emulator (Avaota-A1 SBC)☆41Updated 9 months ago
- Minimal setup to trigger the xz backdoor☆29Updated last year
- Visualize binary files☆132Updated 4 months ago
- Mimojas Firmware Toolkit for unpacking and analysis firmware images☆14Updated 5 years ago