CERT-Polska / phobos-cuda-decryptor-pocLinks
☆70Updated 2 years ago
Alternatives and similar repositories for phobos-cuda-decryptor-poc
Users that are interested in phobos-cuda-decryptor-poc are comparing it to the libraries listed below
Sorting:
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- iTLB multihit PoC☆42Updated last year
- CLI tool, Ghidra plug-in, and Haskell library for analyzing binaries using under-constrained symbolic execution☆122Updated last week
- ☆128Updated 2 years ago
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆108Updated 8 months ago
- A tasty cross-platform tool from Blacksea to debug shellcode!☆92Updated 2 years ago
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆103Updated last year
- ☆114Updated 2 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- XZ backdoor reverse engineering☆98Updated last year
- Playing NES ROMs with Ghidra's PCode Emulator☆102Updated 2 years ago
- ☆35Updated last year
- Thunderclap QEMU-based network card emulation☆27Updated 2 years ago
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆75Updated 3 weeks ago
- Detecting Inconsistencies in Feature or Function Evaluations of Requirements☆67Updated last year
- Security payload for next-Gen firmware architecture☆56Updated 4 months ago
- ugly code to check linux kernel memory and dump some internal structures☆47Updated 10 months ago
- IPC scripts for access to Intel CRBUS☆120Updated 4 years ago
- ☆95Updated last year
- A library for intercepting system calls☆102Updated 8 months ago
- Minimal setup to trigger the xz backdoor☆28Updated 11 months ago
- Visualize binary files☆133Updated 2 weeks ago
- The public release of LeftoverLocals code☆68Updated last year
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆113Updated 2 years ago
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆58Updated last year
- ☆59Updated 2 years ago
- An exploit chain for the Magic Leap One (and probably other TX2 devices)☆68Updated 4 months ago
- PageBuster - dump all executable pages of packed processes.☆203Updated 4 years ago
- All the microcodes, but packaged!☆43Updated this week
- PoC for PixieFail vulnerabilities☆23Updated last year