CSAW Embedded Security Challenge 2019
☆37Nov 24, 2019Updated 6 years ago
Alternatives and similar repositories for csaw_esc_2019
Users that are interested in csaw_esc_2019 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CSAW Embedded Security Challenge 2020☆26Nov 11, 2020Updated 5 years ago
- Multi-GPU acceleration for Fully Homomorphic Encryption☆22Jun 3, 2024Updated last year
- Android App that genereates passcode authentication codes for Postfinance cards☆12Feb 22, 2022Updated 4 years ago
- CSAW 2017 Embedded Security Challenge☆12Jun 7, 2018Updated 7 years ago
- Diavgeia Redefined: Redefined functionality of Diavgeia using RDF and Blockchain (GSOC 2017 GFOSS Project).☆13Jul 23, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Content related to hardware hacking☆56Mar 28, 2019Updated 6 years ago
- ☆11Nov 21, 2020Updated 5 years ago
- Challenges from CSAW 2019 Pwn Race Edition☆12Nov 8, 2019Updated 6 years ago
- FACT analysis plug-in that maps software version to cves☆13Nov 14, 2019Updated 6 years ago
- Diavgeia using Semantic Technologies and Permissionless Blockchains☆16Feb 15, 2018Updated 8 years ago
- ☆16Mar 3, 2025Updated last year
- Raiden project☆24Nov 7, 2021Updated 4 years ago
- Challenge Repository for CSAW CTF Quals 2019☆56Mar 2, 2026Updated 3 weeks ago
- Target-centric program analysis.☆76Mar 16, 2026Updated last week
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Python Flask Web Interface for proxmark3 RDV4 hardware.☆29Aug 16, 2022Updated 3 years ago
- Collection of CTF challenges I made☆18Apr 2, 2018Updated 7 years ago
- First level taint implementation with qemu for linux user mode☆28Aug 11, 2020Updated 5 years ago
- Read only mirror - No pull requests☆20May 7, 2021Updated 4 years ago
- NFC MiTM made with two PN532 readers and a Raspberry Pi.☆33Jan 20, 2026Updated 2 months ago
- Albums for the Illustrated RFID gallery☆38Mar 13, 2026Updated last week
- Source code of HAL-fuzz☆157Feb 4, 2021Updated 5 years ago
- Pwn2Win CTF 2019 platform client☆26Aug 4, 2023Updated 2 years ago
- Presented hardware reverse engineering workshops since 2019☆62Aug 8, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆20Mar 29, 2020Updated 5 years ago
- deepSURF: Detecting Memory Safety Vulnerabilities in Rust Through Fuzzing LLM-Augmented Harnesses☆27Nov 28, 2025Updated 3 months ago
- Wiegand data logger, replay device and micro door-controller☆14Jan 5, 2024Updated 2 years ago
- Dumps from a collection of hotel room keys for analysis☆13Oct 19, 2020Updated 5 years ago
- This repository contains the source of "ARM Binary Exploitaiton" book.☆27Apr 16, 2021Updated 4 years ago
- Project Repository for the NFC Resonant Repeater project☆45Dec 11, 2024Updated last year
- ☆10Apr 11, 2023Updated 2 years ago
- Skype bot written in Java with some X11 magic☆18Mar 16, 2016Updated 10 years ago
- ST25TB / SRx NFC Emulator / Initiator based on TI TRF7970A with MSP430☆45Jan 3, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A framework for lifting ARM32 to LLVM-IR and merging resulting code with LLVM-IR generated from source-code.☆12Oct 20, 2022Updated 3 years ago
- A tool to find/download malware samples from various public repositories☆12Dec 22, 2021Updated 4 years ago
- AIS3 2017 Binary Exploitation☆38Sep 3, 2017Updated 8 years ago
- ☆32Apr 2, 2024Updated last year
- A tool that bypasses PN553 signature protection☆50Aug 16, 2023Updated 2 years ago
- CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness☆11Nov 2, 2024Updated last year
- Tool for algorithmic complexity analysis based on symbolic execution☆10Sep 17, 2018Updated 7 years ago