TrustworthyComputing / csaw_esc_2020Links
CSAW Embedded Security Challenge 2020
☆26Updated 4 years ago
Alternatives and similar repositories for csaw_esc_2020
Users that are interested in csaw_esc_2020 are comparing it to the libraries listed below
Sorting:
- CSAW Embedded Security Challenge 2019☆34Updated 5 years ago
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- ☆188Updated 5 months ago
- An open-source deterministic fault attack simulator prototype☆60Updated 4 years ago
- Migrated to Codeberg☆46Updated 4 years ago
- Curated collection of resources, examples and scripts for Linux kernel devs, researchers and hobbyists.☆59Updated 2 years ago
- Writeups for the RHME3 Challenges☆52Updated 6 years ago
- Files used for reproducing Fuzzware's experiments☆60Updated 2 years ago
- FirmWire has replaced ShannonEE. OLD: A dynamic analysis environment for Samsung's Shannon baseband.☆43Updated 3 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆124Updated 8 years ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 3 years ago
- Cross-architecture instruction counting for CTF solving☆47Updated 3 years ago
- Stuff from CTF contests☆39Updated 6 years ago
- Makes Unicorn traces. Generic Side-Channel and Fault Injection simulator☆188Updated last month
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- Riscure Hack Me embedded hardware CTF 2017-2018.☆88Updated 7 years ago
- Code and exercises for a workshop on z3 and angr☆230Updated 4 years ago
- Repo for storing CTF related stuff (Writeups, etc.)☆52Updated last year
- High performance fuzzing using riscv to x86 binary translations and modern fuzzing techniques☆152Updated last year
- CLKscrew Code and Scripts☆28Updated 5 years ago
- Automated recovery of Linux kernel build configurations☆24Updated 3 years ago
- ☆135Updated 4 years ago
- Lepton is a Lightweight ELF Parsing Tool that was designed specifically for analyzing and editing binaries with damaged or corrupted ELF …☆35Updated 4 years ago
- ☆36Updated 4 years ago
- ☆66Updated 6 months ago
- Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks☆36Updated 4 years ago
- ☆75Updated last year
- A firmware base address search tool.☆44Updated last year
- ☆27Updated 6 years ago
- Finds the base address of a firmware by comparing string addresses with target pointer addresses☆52Updated 6 months ago