CERT-Polska / phobos-cuda-decryptor-pocLinks
☆70Updated 2 years ago
Alternatives and similar repositories for phobos-cuda-decryptor-poc
Users that are interested in phobos-cuda-decryptor-poc are comparing it to the libraries listed below
Sorting:
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆108Updated 7 months ago
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆103Updated last year
- Minimal setup to trigger the xz backdoor☆28Updated 10 months ago
- Code used in blog posts☆34Updated 3 months ago
- A tasty cross-platform tool from Blacksea to debug shellcode!☆92Updated 2 years ago
- iTLB multihit PoC☆42Updated last year
- Detecting Inconsistencies in Feature or Function Evaluations of Requirements☆67Updated last year
- CLI tool, Ghidra plug-in, and Haskell library for analyzing binaries using under-constrained symbolic execution☆119Updated 2 weeks ago
- ☆128Updated 2 years ago
- Playing NES ROMs with Ghidra's PCode Emulator☆102Updated last year
- Visualize binary files☆132Updated this week
- PageBuster - dump all executable pages of packed processes.☆203Updated 4 years ago
- Compiling C to FlipJump☆92Updated 7 months ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- ☆35Updated last year
- A library for intercepting system calls☆101Updated 7 months ago
- XZ backdoor reverse engineering☆98Updated last year
- Slapped-together tools to reprogram the BIOS on a bricked HP Envy laptop.☆24Updated 3 years ago
- ☆114Updated 2 years ago
- LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems (ACSAC 2021)☆67Updated 3 years ago
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆75Updated this week
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆112Updated 2 years ago
- A network forensics and passive sniffer tool☆51Updated this week
- ☆112Updated 2 years ago
- Security payload for next-Gen firmware architecture☆54Updated 4 months ago
- A very high-speed, configurable, and portable packet-crafting utility optimized for embedded devices