CERT-Polska / phobos-cuda-decryptor-pocLinks
☆70Updated 2 years ago
Alternatives and similar repositories for phobos-cuda-decryptor-poc
Users that are interested in phobos-cuda-decryptor-poc are comparing it to the libraries listed below
Sorting:
- A tasty cross-platform tool from Blacksea to debug shellcode!☆92Updated 2 years ago
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆123Updated 2 months ago
- ☆129Updated 3 years ago
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆103Updated last year
- CLI tool, Ghidra plug-in, and Haskell library for analyzing binaries using under-constrained symbolic execution☆125Updated this week
- iTLB multihit PoC☆42Updated 2 years ago
- Playing NES ROMs with Ghidra's PCode Emulator☆102Updated 2 years ago
- Detecting Inconsistencies in Feature or Function Evaluations of Requirements☆68Updated last year
- Minimal setup to trigger the xz backdoor☆29Updated last year
- ☆117Updated 2 years ago
- ☆35Updated last year
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated 2 years ago
- XZ backdoor reverse engineering☆99Updated last year
- A library for intercepting system calls☆103Updated 11 months ago
- Thunderclap QEMU-based network card emulation☆29Updated 3 years ago
- Code used in blog posts☆34Updated 7 months ago
- LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems (ACSAC 2021)☆68Updated 3 years ago
- The public release of LeftoverLocals code☆70Updated last year
- Visualize binary files☆133Updated 3 months ago
- Security payload for next-Gen firmware architecture☆59Updated 7 months ago
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆78Updated 4 months ago
- Python 2.7 bytecode d̶e̶o̶b̶f̶u̶s̶c̶a̶t̶o̶r unfucker☆208Updated 2 years ago
- ☆112Updated 2 years ago
- An exploit chain for the Magic Leap One (and probably other TX2 devices)☆71Updated 7 months ago
- Utility to find hidden Linux kernel modules☆147Updated 5 months ago
- Intel Management Engine JTAG Proof of Concept☆145Updated 5 years ago
- Compiling C to FlipJump☆96Updated 11 months ago
- LoongArch userspace emulator☆28Updated this week
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆114Updated 2 years ago