Hardware Security Labs
☆31May 3, 2017Updated 8 years ago
Alternatives and similar repositories for Hardware-Security
Users that are interested in Hardware-Security are comparing it to the libraries listed below
Sorting:
- Hardware Trojan on a Basis 3 FPGA for Hardware and Embedded Systems Security☆11May 1, 2017Updated 8 years ago
- hardware security course from Coursera and University of Maryland☆28Mar 12, 2015Updated 10 years ago
- A Built-in-Self-Test Scheme for Online Evaluation of Physical Unclonable Functions and True Random Number Generators☆24Nov 24, 2017Updated 8 years ago
- Modular library for manipulating physically-uncloneable functions☆19Dec 17, 2016Updated 9 years ago
- FPGA implementation of a physical unclonable function for authentication☆33Apr 7, 2017Updated 8 years ago
- Framework based on Partial Reconfiguration for chip characterization utilizing ring-oscillator PUFs☆13Apr 1, 2020Updated 5 years ago
- cross site scripting framework plugin for metasploit☆17Aug 23, 2012Updated 13 years ago
- A stochastic circuit optimizer for Cadence Virtuoso, using the NSGA-II genetic algorithm.☆12Dec 12, 2021Updated 4 years ago
- A basic implementation of a SAT attack on logic locking.☆13Jun 30, 2021Updated 4 years ago
- Minimal RISC-V RV32I CPU design as described in a companion blog post.☆13Jun 14, 2020Updated 5 years ago
- Starter Kit: Hardware Hacking☆16Jan 15, 2021Updated 5 years ago
- ESP32-NOW with Wifi☆23Apr 11, 2025Updated 10 months ago
- OpenWRT on STM32MP1☆16Mar 11, 2023Updated 2 years ago
- tiny embedded MIPS virtualization platform - a very small and lean hypervisor using MIPS R5 hardware VZ option for embedded systems (IoT …☆20Sep 26, 2023Updated 2 years ago
- Re-randomizing the memory layout of a process at runtime☆21May 28, 2016Updated 9 years ago
- A Docker image for a software defined radio tuned to listen for Honeywell RF security sensors at 345Mhz☆19Updated this week
- Schematic, Layout Design & Simulation in 180nm Technology☆22Nov 21, 2020Updated 5 years ago
- Defense/Attack PUF Library (DA PUF Library)☆55May 5, 2020Updated 5 years ago
- Cryptanalysis of Physically Unclonable Functions☆92Jun 29, 2024Updated last year
- Bbuzz: a bit-aware network protocol fuzzing and reverse engineering framework☆23Jan 27, 2021Updated 5 years ago
- Linux kernels (CGC DECREE and vanilla) with S2E extensions☆24Jul 6, 2024Updated last year
- Android Automation Tool☆21May 9, 2018Updated 7 years ago
- Papers about known hacking, security, hardware, software, computer, network and other ressources.☆79Sep 29, 2019Updated 6 years ago
- understanding the tinyfpga bootloader☆25Apr 22, 2018Updated 7 years ago
- Standalone C version of the MSM8974 TrustZone exploit☆27Sep 30, 2020Updated 5 years ago
- exploit vulnerable c/c++ programms with buffer overflow attacks☆24Jul 18, 2022Updated 3 years ago
- Archive from bluebox security open source: Dalvik bytecode tampering crackme☆86Nov 15, 2015Updated 10 years ago
- ☆35Mar 31, 2019Updated 6 years ago
- A collection of awesome tools, books, resources, software, documents and cool stuff about IoT and HW security.☆33May 4, 2025Updated 10 months ago
- Hydrabus Shield for LIN and CAN Buses☆35Mar 29, 2023Updated 2 years ago
- A list of resources for those interested in hardware, embedded, and IoT security☆75Oct 6, 2024Updated last year
- SIM Card tunnel for Alcatel OT-918D☆38Sep 29, 2014Updated 11 years ago
- Tool to view heap chunks and memory writes (using pintool)☆42Dec 8, 2018Updated 7 years ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Dec 31, 2021Updated 4 years ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆42Sep 1, 2020Updated 5 years ago
- Just a single binary no config file Chromium(64bit) updater.☆11May 5, 2018Updated 7 years ago
- Present Crypto Engine in Verilog☆11Feb 27, 2016Updated 10 years ago
- An introductory course on machine vision and related machine learning used in automation, autopilots, security and inspection systems. To…☆33Jun 5, 2022Updated 3 years ago
- DDR4 Simulation Project in System Verilog☆44Aug 18, 2014Updated 11 years ago