HSTRG1 / GHOST_benchmarksLinks
A collection of hardware Trojans (HTs) automatically generated by Large Language Models (GPT-4, Gemini-1.5-pro, and LLaMA3) targeting SRAM, AES-128, and UART designs. These benchmarks were created using the GHOST framework for automated HT insertion
☆7Updated 5 months ago
Alternatives and similar repositories for GHOST_benchmarks
Users that are interested in GHOST_benchmarks are comparing it to the libraries listed below
Sorting:
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆27Updated 10 months ago
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆12Updated 6 months ago
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆39Updated 3 months ago
- Burp extension used to snip any header from all the requests.☆22Updated last year
- A repository preserving darknet market data, including vendor lists, PGP keys, listings, and more for research & intelligence purposes.☆32Updated 2 months ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆13Updated last year
- This repository contains the best fuzzing wordlist files☆33Updated 6 months ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated last year
- Yet Another Mac Changer!!!☆12Updated 2 years ago
- Red Team Server (RTS)☆16Updated last year
- An advanced scanner for exposed secrets in web pages, APIs, and source code.☆12Updated last month
- This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from …☆14Updated 9 months ago
- Auto exploitation tool for CVE-2024-24401.☆36Updated 9 months ago
- ☆13Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- Python-based web scraper for a darkweb marketplace on the Tor network.☆32Updated 8 months ago
- A tool to check microsofts user real endpoint to get data about a tenant.☆14Updated 4 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆15Updated 4 months ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- hacking tools☆14Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- Powershell Scripts for Blue Team members☆12Updated last year
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Updated 8 months ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- RSEScan is a command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a gi…☆17Updated last year
- DataReaper is a powerful Python tool designed to harvest data from publicly accessible HTTP servers. It combines the capabilities of Shod…☆11Updated last year
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆26Updated last year
- SilverTGOSINT is a Telegram OSINT tool that collects messages from target users in Telegram groups and tracks users who extract data from…☆26Updated last month