hardware security course from Coursera and University of Maryland
☆28Mar 12, 2015Updated 11 years ago
Alternatives and similar repositories for hardwareSecurity
Users that are interested in hardwareSecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hardware Security Labs☆31May 3, 2017Updated 8 years ago
- ☆43Oct 28, 2016Updated 9 years ago
- A stochastic circuit optimizer for Cadence Virtuoso, using the NSGA-II genetic algorithm.☆13Dec 12, 2021Updated 4 years ago
- Capture the flag - security challenges☆13Feb 29, 2016Updated 10 years ago
- ☆11Aug 9, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- This repository offers a detailed taxonomy of existing AI-driven security solutions tailored for DevSecOps, highlighting the current rese…☆20Jul 2, 2025Updated 9 months ago
- NetWatch System Management Mode VNC Server☆34Oct 12, 2009Updated 16 years ago
- Simple shellcode testing tool.☆49Feb 24, 2012Updated 14 years ago
- Starter Kit: Hardware Hacking☆16Jan 15, 2021Updated 5 years ago
- Hardware Trojan on a Basis 3 FPGA for Hardware and Embedded Systems Security☆11May 1, 2017Updated 8 years ago
- Troopers Conference Supporting Materials☆12Apr 8, 2015Updated 11 years ago
- Multi-arch Docker images for Idris 2☆13Apr 7, 2026Updated last week
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Code snippets☆11Dec 2, 2024Updated last year
- Reverse transparent protocol agnostic socks proxy.☆17Jan 14, 2020Updated 6 years ago
- Reliable export of the CloudWatch logs to an S3 bucket☆26Sep 25, 2024Updated last year
- Algebraic Data Types for perl6, inspired by Haskell☆12Jan 15, 2020Updated 6 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- ☆35Oct 21, 2020Updated 5 years ago
- Example Code Review Exercise☆14Apr 14, 2025Updated last year
- ☆13Feb 14, 2020Updated 6 years ago
- An English translation of a problem course ("Trivium") in undergraduate maths☆10Jan 25, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Terminal feed aggregator and launcher for Youtube channels☆10Dec 20, 2023Updated 2 years ago
- Collection of binaries and scripts found across the net☆20Dec 2, 2013Updated 12 years ago
- SecurityTube Hack of the Day☆17Apr 2, 2013Updated 13 years ago
- ☆12Jul 18, 2022Updated 3 years ago
- linux kernel system call hooking☆18Dec 13, 2014Updated 11 years ago
- Implementation of Multi-Party Threshold Private Set Intersection with Sublinear Communication☆12Feb 2, 2021Updated 5 years ago
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- Source code for the HorrorScope and material for the ScaCheapier workshop☆25Dec 24, 2019Updated 6 years ago
- Collection of Security Related Examples for Learning Purposes☆13Jan 29, 2016Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Examples and design pattern for VHDL verification☆15Apr 10, 2016Updated 10 years ago
- A language-generic implementation of equality saturation in Haskell☆22Dec 4, 2018Updated 7 years ago
- Wireless Pentest☆18Apr 5, 2018Updated 8 years ago
- Write ups☆16Dec 13, 2017Updated 8 years ago
- my reading list for reverse engineering malware & exploit development☆16Feb 3, 2026Updated 2 months ago
- Private Set Union from Symmetric-Key Techniques☆11Jan 13, 2024Updated 2 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago