CERT-Polska / phobos-cuda-decryptor-pocLinks
☆70Updated 2 years ago
Alternatives and similar repositories for phobos-cuda-decryptor-poc
Users that are interested in phobos-cuda-decryptor-poc are comparing it to the libraries listed below
Sorting:
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆108Updated 8 months ago
- CLI tool, Ghidra plug-in, and Haskell library for analyzing binaries using under-constrained symbolic execution☆123Updated last week
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- iTLB multihit PoC☆42Updated last year
- Minimal setup to trigger the xz backdoor☆28Updated last year
- A tasty cross-platform tool from Blacksea to debug shellcode!☆91Updated 2 years ago
- ☆129Updated 2 years ago
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆103Updated last year
- ☆114Updated 2 years ago
- ☆112Updated 2 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- XZ backdoor reverse engineering☆98Updated last year
- Playing NES ROMs with Ghidra's PCode Emulator☆102Updated 2 years ago
- PageBuster - dump all executable pages of packed processes.☆203Updated 4 years ago
- rev.ng configuration for orchestra. The starting point for any development.☆36Updated 2 weeks ago
- Detecting Inconsistencies in Feature or Function Evaluations of Requirements☆67Updated last year
- ☆35Updated last year
- IPC scripts for access to Intel CRBUS☆120Updated 4 years ago
- Code used in blog posts☆34Updated 5 months ago
- Intel Management Engine JTAG Proof of Concept☆145Updated 5 years ago
- LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems (ACSAC 2021)☆67Updated 3 years ago
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆144Updated 4 years ago
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆58Updated last year
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆75Updated last month
- Thunderclap QEMU-based network card emulation☆27Updated 3 years ago
- Compiling C to FlipJump☆94Updated 9 months ago
- Security payload for next-Gen firmware architecture☆56Updated 5 months ago
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆160Updated 3 years ago
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆32Updated 2 years ago
- The public release of LeftoverLocals code☆70Updated last year