TrustworthyComputing / csaw_esc_2019Links
CSAW Embedded Security Challenge 2019
☆37Updated 6 years ago
Alternatives and similar repositories for csaw_esc_2019
Users that are interested in csaw_esc_2019 are comparing it to the libraries listed below
Sorting:
- CSAW Embedded Security Challenge 2020☆26Updated 5 years ago
- Exercises for (legacy) Computer Security course in the University of Oulu☆46Updated 2 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Updated 5 years ago
- ☆17Updated 7 years ago
- Ledger Donjon CTF 2020☆17Updated 4 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated last year
- Riscure Hack Me embedded hardware CTF 2017-2018.☆88Updated 7 years ago
- Slides and stuffs of the meetings during the 2019☆33Updated 3 years ago
- Nailgun attack on ARM devices.☆164Updated 4 years ago
- ☆188Updated 9 months ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆86Updated last year
- A flag submitter service with distributed attackers for attack/defense CTF games.☆71Updated 6 years ago
- Content related to hardware hacking☆54Updated 6 years ago
- ☆54Updated 7 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆65Updated 3 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Updated 6 years ago
- My solutions to some CTF challenges and a list of interesting resources about pwning stuff☆112Updated 6 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆73Updated 8 years ago
- Protostart Stack Overflow Challenges compiled for ARMv6.☆56Updated 8 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆164Updated 4 years ago
- FLUFFI (Fully Localized Utility For Fuzzing Instantaneously) - A distributed evolutionary binary fuzzer for pentesters☆101Updated 3 years ago
- A curated list of awesome baseband research resources☆175Updated 5 years ago
- ☆90Updated 3 years ago
- Writeups for the RHME3 Challenges☆52Updated 6 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆52Updated 7 years ago
- "Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones" ACSAC 2019☆158Updated 4 years ago
- Writeups for the RHME2 CTF☆13Updated 8 years ago
- Reproduce CVEs from ForAllSecure Vulnerabilities Lab☆113Updated 2 years ago
- Network and USB protocol fuzzing toolkit.☆69Updated 7 years ago
- ☆18Updated 5 years ago