CERT-Polska / phobos-cuda-decryptor-pocLinks
☆70Updated 2 years ago
Alternatives and similar repositories for phobos-cuda-decryptor-poc
Users that are interested in phobos-cuda-decryptor-poc are comparing it to the libraries listed below
Sorting:
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆107Updated 5 months ago
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆103Updated last year
- A tasty cross-platform tool from Blacksea to debug shellcode!☆92Updated 2 years ago
- Code used in blog posts☆34Updated 2 months ago
- Minimal setup to trigger the xz backdoor☆28Updated 8 months ago
- ☆128Updated 2 years ago
- Detecting Inconsistencies in Feature or Function Evaluations of Requirements☆67Updated last year
- My Analysis of the VC4 Assembly Code from the RPI4☆35Updated 5 months ago
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- ☆35Updated last year
- CLI tool, Ghidra plug-in, and Haskell library for analyzing binaries using under-constrained symbolic execution☆119Updated this week
- XZ backdoor reverse engineering☆96Updated 11 months ago
- LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems (ACSAC 2021)☆67Updated 3 years ago
- Filesystems that cause an OS panic☆13Updated 5 years ago
- Visualize binary files☆132Updated last week
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- Playing NES ROMs with Ghidra's PCode Emulator☆102Updated last year
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆58Updated last year
- A very high-speed, configurable, and portable packet-crafting utility optimized for embedded devices☆78Updated 6 months ago
- Research and proof of concept to develop the next SecureDrop with end to end encryption.☆48Updated last month
- An exploit chain for the Magic Leap One (and probably other TX2 devices)☆57Updated 2 months ago
- ugly code to check linux kernel memory and dump some internal structures☆47Updated 7 months ago
- A tiny library to properly encrypt IP addresses.☆19Updated last month
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆73Updated 2 months ago
- abuse ImageMagick (or GraphicsMagick) to create arbitrary files☆53Updated 3 months ago
- iTLB multihit PoC☆41Updated last year
- Emulate Apache NuttX RTOS for Arm64 with Unicorn Emulator (Avaota-A1 SBC)☆40Updated 3 months ago
- ☆113Updated last year
- Fast and standards compliant DNS zone parser☆130Updated last week
- ☆18Updated last year