KarenWest / hardwareSecurityLinks
hardware security course from Coursera and University of Maryland
☆27Updated 10 years ago
Alternatives and similar repositories for hardwareSecurity
Users that are interested in hardwareSecurity are comparing it to the libraries listed below
Sorting:
- Hardware Security Labs☆30Updated 8 years ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Updated 3 years ago
- SCALE: Side-Channel Attack Lab. Exercises☆43Updated 2 years ago
- Tools for working with the 802.11B scrambler when writing Packet-in-Packet exploits.☆19Updated 12 years ago
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆95Updated 7 years ago
- GDB cheatsheet for reversing binaries☆21Updated 6 years ago
- Papers about known hacking, security, hardware, software, computer, network and other ressources.☆78Updated 6 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- Timing Sidechannel workshop☆30Updated 11 years ago
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Updated 5 years ago
- Modular library for manipulating physically-uncloneable functions☆18Updated 8 years ago
- Exercises for (legacy) Computer Security course in the University of Oulu☆46Updated 2 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆41Updated 7 years ago
- ☆10Updated 9 years ago
- Lecture notes for the Hardware and Embedded Systems Security lecture☆80Updated 2 years ago
- SAVIORBURST☆22Updated 9 years ago
- Open tools for side-channel analysis and related techniques. Currently, this repository contains: 1) A near-field EM probe amplifier circ…☆37Updated 10 years ago
- Cryptanalysis library for breaking classical ciphers☆28Updated 6 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 3 years ago
- Eliminating Keystroke Timing Attacks☆22Updated 7 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Public Advisories for Security Vulnerabilities.☆25Updated 10 years ago
- Hardware design files for the PMOD based MUX☆13Updated 6 years ago
- A Security and Privacy Guide for non-technical users☆45Updated 10 years ago
- Megatron - A System for Abuse- and Incident Handling☆44Updated 8 years ago
- LEIA: the Lab Embedded ISO7816 Analyzer A Custom Smartcard Reader for the ChipWhisperer PCB☆20Updated 3 years ago
- ☆14Updated 10 years ago
- Scapy docs, examples, scripts and other stuff☆40Updated 10 years ago
- ☆42Updated 9 years ago