Rhme2 challenge (2016)
☆331Jun 12, 2017Updated 8 years ago
Alternatives and similar repositories for Rhme-2016
Users that are interested in Rhme-2016 are comparing it to the libraries listed below
Sorting:
- Riscure Hack Me embedded hardware CTF 2017-2018.☆88May 29, 2018Updated 7 years ago
- RHme+ 2015 challenge☆115Jun 7, 2016Updated 9 years ago
- The RHme2 (Riscure Hack me 2) is a low level hardware CTF challenge that comes in the form of an Arduino Nano board. The new edition prov…☆59Mar 27, 2017Updated 8 years ago
- Writeups for the RHME2 CTF☆13Mar 6, 2017Updated 8 years ago
- Writeups for the RHME3 Challenges☆52Jan 7, 2019Updated 7 years ago
- the most basic introduction to performing a Vcc glitch attack☆26Sep 25, 2017Updated 8 years ago
- A Bluetooth low energy capture the flag☆746Aug 11, 2025Updated 6 months ago
- Side-channel toolkit in Julia☆167Jan 14, 2022Updated 4 years ago
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia☆52Feb 15, 2020Updated 6 years ago
- ChipWhisperer - the complete open-source toolchain for side-channel power analysis and glitching attacks☆1,416Updated this week
- RHme3 CTF writeups☆20Aug 6, 2022Updated 3 years ago
- ☆49Feb 16, 2018Updated 8 years ago
- Repository of various public white-box cryptographic implementations and their practical attacks.☆672Apr 10, 2024Updated last year
- Write ups for Ph0wn CTF☆48Aug 12, 2025Updated 6 months ago
- bctf2017 challenges☆11Apr 20, 2017Updated 8 years ago
- A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to recon…☆299Dec 7, 2023Updated 2 years ago
- A tutorial on side channel leakage modelling using linear regression☆14Nov 20, 2017Updated 8 years ago
- Power analysis tool (forked from NewAE ChipWhisperer)☆27Oct 22, 2016Updated 9 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,936Dec 9, 2021Updated 4 years ago
- GUI tool to create ROP chains using the ropper API☆159Mar 30, 2018Updated 7 years ago
- A research tool to identify the version of shared library files.☆22Mar 14, 2017Updated 8 years ago
- ☆92Aug 18, 2024Updated last year
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Mar 16, 2017Updated 8 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- JTAGulator: Assisted discovery of on-chip debug interfaces☆765Jul 29, 2025Updated 7 months ago
- Kinda useful notes collated together publicly☆500May 29, 2019Updated 6 years ago
- ☆16Aug 10, 2018Updated 7 years ago
- FPGA-based glitcher for the Digilent Arty FPGA development board.☆31Aug 18, 2017Updated 8 years ago
- Opensource repository for DVID V2☆17Jun 3, 2025Updated 8 months ago
- Using Intel's PIN tool to solve CTF problems☆507Apr 12, 2020Updated 5 years ago
- The Damn Vulnerable Router Firmware Project☆709Apr 7, 2021Updated 4 years ago
- Fetch and set configuration values for IDA Plugins☆25Nov 26, 2025Updated 3 months ago
- Makes Unicorn traces. Generic Side-Channel and Fault Injection simulator☆194Aug 13, 2025Updated 6 months ago
- A collection where my current and future writeups for exploits/CTF will go☆765May 9, 2021Updated 4 years ago
- Repository to train/learn memory corruption on the ARM platform.☆356Apr 17, 2017Updated 8 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 9 years ago
- Cross-Domain DPA Attack on SAML11☆17Jul 14, 2019Updated 6 years ago
- Tiny project with that demonstrates how to enable Return Flow Guard☆12Feb 7, 2017Updated 9 years ago
- ☆43Oct 28, 2016Updated 9 years ago