HSTRG1 / GHOST_benchmarksLinks
A collection of hardware Trojans (HTs) automatically generated by Large Language Models (GPT-4, Gemini-1.5-pro, and LLaMA3) targeting SRAM, AES-128, and UART designs. These benchmarks were created using the GHOST framework for automated HT insertion
☆11Updated last month
Alternatives and similar repositories for GHOST_benchmarks
Users that are interested in GHOST_benchmarks are comparing it to the libraries listed below
Sorting:
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆27Updated last year
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆12Updated 9 months ago
- This is a working variant of the Mirai IOT botnet☆14Updated 2 years ago
- Auto exploitation tool for CVE-2024-24401.☆35Updated last year
- ☆13Updated last year
- Kali Packerge Manager☆65Updated last year
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Updated 2 years ago
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆28Updated 5 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 11 months ago
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆15Updated last month
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆42Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated 2 years ago
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)☆23Updated last year
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆65Updated 6 months ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆26Updated 2 years ago
- Red Team Server (RTS)☆16Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Updated last year
- Burp extension used to snip any header from all the requests.☆23Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Updated last year
- Web Path Finder☆61Updated last year
- This repository contains the best fuzzing wordlist files☆34Updated 9 months ago
- Mass bruteforce authentication of common services with common credentials.☆48Updated last year
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆41Updated 7 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Updated last year
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…