HSTRG1 / GHOST_benchmarks
A collection of hardware Trojans (HTs) automatically generated by Large Language Models (GPT-4, Gemini-1.5-pro, and LLaMA3) targeting SRAM, AES-128, and UART designs. These benchmarks were created using the GHOST framework for automated HT insertion
☆7Updated 5 months ago
Alternatives and similar repositories for GHOST_benchmarks:
Users that are interested in GHOST_benchmarks are comparing it to the libraries listed below
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆27Updated 9 months ago
- Auto exploitation tool for CVE-2024-24401.☆34Updated 8 months ago
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆33Updated 2 months ago
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆12Updated 5 months ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated last year
- This repository contains the best fuzzing wordlist files☆29Updated 5 months ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- FireHawk: The Elite Firebase Security Testing Utility☆21Updated 11 months ago
- Subdomains scanner Spider☆13Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- ☆13Updated last year
- GitHub CVE Repository Hunt☆18Updated 9 months ago
- DataReaper is a powerful Python tool designed to harvest data from publicly accessible HTTP servers. It combines the capabilities of Shod…☆11Updated last year
- Powershell Scripts for Blue Team members☆12Updated last year
- aiohttp LFI (CVE-2024-23334)☆26Updated last year
- Unauthorized Access to Metadata and User Data like CTF☆26Updated 5 months ago
- RSEScan is a command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a gi…☆17Updated 11 months ago
- Tool for scanning domains for .git directories.☆16Updated last year
- Red Team Server (RTS)☆16Updated last year
- MacroExploit use in excel sheet☆20Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Updated 7 months ago
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆24Updated 3 weeks ago
- DLink DIR-846 Authenticated Remote Code Execution☆18Updated last year
- An advanced scanner for exposed secrets in web pages, APIs, and source code.☆11Updated 2 weeks ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Updated last year
- Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit☆17Updated 11 months ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆14Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆23Updated 11 months ago
- CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow☆24Updated 9 months ago