HSTRG1 / GHOST_benchmarks
A collection of hardware Trojans (HTs) automatically generated by Large Language Models (GPT-4, Gemini-1.5-pro, and LLaMA3) targeting SRAM, AES-128, and UART designs. These benchmarks were created using the GHOST framework for automated HT insertion
☆7Updated 3 months ago
Alternatives and similar repositories for GHOST_benchmarks:
Users that are interested in GHOST_benchmarks are comparing it to the libraries listed below
- This repository contains the best fuzzing wordlist files☆29Updated 3 months ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- Auto exploitation tool for CVE-2024-24401.☆33Updated 6 months ago
- GitHub CVE Repository Hunt☆18Updated 8 months ago
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆12Updated 3 months ago
- ☆17Updated this week
- ☆13Updated last year
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆22Updated 3 months ago
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆12Updated this week
- Cisco IOS Security Inspector☆22Updated this week
- Mass bruteforce authentication of common services with common credentials.☆47Updated last year
- Python-based web scraper for a darkweb marketplace on the Tor network.☆27Updated 6 months ago
- SSH & FTP brute-forcing tool written in python☆12Updated 5 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆24Updated 8 months ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆24Updated 9 months ago
- Web Recon Tool 🔍 An efficient reconnaissance tool for security researchers, ethical hackers, and developers to gather vital information …☆21Updated 4 months ago
- Automated way to extract juicy info with subfinder and waybackurls☆31Updated this week
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Updated last year
- Check for the existence of an email on Google platforms☆13Updated last year
- Powershell Scripts for Blue Team members☆12Updated last year
- Short Programs For Spreading Malware☆15Updated 3 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- Unauthorized Access to Metadata and User Data like CTF☆26Updated 4 months ago
- ☆61Updated 11 months ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆14Updated 10 months ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆47Updated 9 months ago
- RSEScan is a command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a gi…☆16Updated 9 months ago
- LNK-Dropper Builder☆21Updated 6 months ago
- Tool for bypassing logins vulnerable against SQL injection☆45Updated 11 months ago