HSTRG1 / GHOST_benchmarksLinks
A collection of hardware Trojans (HTs) automatically generated by Large Language Models (GPT-4, Gemini-1.5-pro, and LLaMA3) targeting SRAM, AES-128, and UART designs. These benchmarks were created using the GHOST framework for automated HT insertion
☆11Updated last month
Alternatives and similar repositories for GHOST_benchmarks
Users that are interested in GHOST_benchmarks are comparing it to the libraries listed below
Sorting:
- Auto exploitation tool for CVE-2024-24401.☆36Updated last year
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Updated last year
- This is a working variant of the Mirai IOT botnet☆14Updated 3 years ago
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆13Updated 11 months ago
- ☆13Updated last year
- GitHub CVE Repository Hunt☆19Updated last year
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- This repository contains the best fuzzing wordlist files☆34Updated 11 months ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆47Updated 4 months ago
- SSH & FTP brute-forcing tool written in python☆11Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Updated last year
- Burp extension used to snip any header from all the requests.☆23Updated 2 years ago
- Web Path Finder☆60Updated 2 years ago
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Updated 2 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated 2 years ago
- CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection)☆29Updated 2 years ago
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆31Updated 7 months ago
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the Democratic People's Republic …☆29Updated 6 months ago
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆32Updated last year
- Kali Packerge Manager☆64Updated 2 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit☆18Updated last year
- 「🧱」Test a list of payloads and see if you can bypass it☆61Updated 3 years ago
- An advanced scanner for exposed secrets in web pages, APIs, and source code.☆12Updated 7 months ago
- Unauthorized Access to Metadata and User Data like CTF☆27Updated 11 months ago
- A fast Go-based tool to uncover sensitive information in JavaScript☆35Updated 4 months ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆45Updated last year