Rhme2 challenge (2016)
☆330Jun 12, 2017Updated 8 years ago
Alternatives and similar repositories for Rhme-2016
Users that are interested in Rhme-2016 are comparing it to the libraries listed below
Sorting:
- Riscure Hack Me embedded hardware CTF 2017-2018.☆88May 29, 2018Updated 7 years ago
- RHme+ 2015 challenge☆115Jun 7, 2016Updated 9 years ago
- The RHme2 (Riscure Hack me 2) is a low level hardware CTF challenge that comes in the form of an Arduino Nano board. The new edition prov…☆59Mar 27, 2017Updated 8 years ago
- Writeups for the RHME2 CTF☆14Mar 6, 2017Updated 9 years ago
- Writeups for the RHME3 Challenges☆53Jan 7, 2019Updated 7 years ago
- the most basic introduction to performing a Vcc glitch attack☆26Sep 25, 2017Updated 8 years ago
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia☆53Feb 15, 2020Updated 6 years ago
- Side-channel toolkit in Julia☆167Jan 14, 2022Updated 4 years ago
- A Bluetooth low energy capture the flag☆750Mar 14, 2026Updated last week
- A tutorial on side channel leakage modelling using linear regression☆15Nov 20, 2017Updated 8 years ago
- Power analysis tool (forked from NewAE ChipWhisperer)☆27Oct 22, 2016Updated 9 years ago
- ChipWhisperer - the complete open-source toolchain for side-channel power analysis and glitching attacks☆1,436Feb 25, 2026Updated 3 weeks ago
- ☆49Feb 16, 2018Updated 8 years ago
- RHme3 CTF writeups☆21Aug 6, 2022Updated 3 years ago
- Write ups for Ph0wn CTF☆47Aug 12, 2025Updated 7 months ago
- bctf2017 challenges☆11Apr 20, 2017Updated 8 years ago
- Repository of various public white-box cryptographic implementations and their practical attacks.☆675Apr 10, 2024Updated last year
- A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to recon…☆301Dec 7, 2023Updated 2 years ago
- A research tool to identify the version of shared library files.☆22Mar 14, 2017Updated 9 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,950Dec 9, 2021Updated 4 years ago
- FPGA-based glitcher for the Digilent Arty FPGA development board.☆31Aug 18, 2017Updated 8 years ago
- The Skull CTF, A mind-bending hardware puzzle in three acts☆17Apr 1, 2021Updated 4 years ago
- JTAGulator: Assisted discovery of on-chip debug interfaces☆770Jul 29, 2025Updated 7 months ago
- ☆43Oct 28, 2016Updated 9 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆40Mar 16, 2017Updated 9 years ago
- Kinda useful notes collated together publicly☆500May 29, 2019Updated 6 years ago
- GUI tool to create ROP chains using the ropper API☆159Mar 30, 2018Updated 7 years ago
- Why not run micropython on your EMFI tool?☆709Aug 28, 2024Updated last year
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- CSAW Embedded Security Challenge 2020☆26Nov 11, 2020Updated 5 years ago
- Damn Vulnerable IoT Device☆219Feb 12, 2024Updated 2 years ago
- Tiny project with that demonstrates how to enable Return Flow Guard☆12Feb 7, 2017Updated 9 years ago
- The Damn Vulnerable Router Firmware Project☆712Apr 7, 2021Updated 4 years ago
- ChipJabber-Unplugged does new-school attacks with old-school logic.☆15Sep 16, 2020Updated 5 years ago
- A curated list of awesome embedded and IoT security resources.☆2,241Oct 17, 2023Updated 2 years ago
- Interactive ChipWhisperer tutorials using Jupyter notebooks.☆334Feb 25, 2026Updated 3 weeks ago
- ☆16Aug 10, 2018Updated 7 years ago
- Using Intel's PIN tool to solve CTF problems☆507Apr 12, 2020Updated 5 years ago
- ☆92Aug 18, 2024Updated last year