TrustworthyComputing / csaw_esc_2020Links
CSAW Embedded Security Challenge 2020
☆26Updated 4 years ago
Alternatives and similar repositories for csaw_esc_2020
Users that are interested in csaw_esc_2020 are comparing it to the libraries listed below
Sorting:
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- CSAW Embedded Security Challenge 2019☆34Updated 5 years ago
- An open-source deterministic fault attack simulator prototype☆58Updated 4 years ago
- ☆36Updated 4 years ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 3 years ago
- Alphanumeric+1 shellcoding tools for RISC-V☆36Updated 5 years ago
- Lepton is a Lightweight ELF Parsing Tool that was designed specifically for analyzing and editing binaries with damaged or corrupted ELF …☆35Updated 4 years ago
- Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks☆37Updated 4 years ago
- experimentation/code from Tanguy Dubroca (summer 2019)☆28Updated 5 years ago
- Curated collection of resources, examples and scripts for Linux kernel devs, researchers and hobbyists.☆58Updated 2 years ago
- Colin O'Flynn's Hacakday talk at Remoticon 2021 support repo.☆22Updated 3 years ago
- Migrated to Codeberg☆46Updated 4 years ago
- An AFL scaling benchmarking tool☆18Updated 5 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 6 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆27Updated last year
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- ☆18Updated 4 years ago
- Collection of RISC-V exploits☆30Updated 5 years ago
- Here's the slides and audio for a talk I did at NYU on the 13th of November 2018☆27Updated 6 years ago
- the challenge generation framework for pwn.college☆22Updated 2 months ago
- ROPMate is the first Visual Analytics system specifically designed to assist human in composing ROP chains with the desired semantics.☆26Updated 4 years ago
- CPU Adventure 2 challenge from the Dragon CTF 2019☆16Updated last month
- Lab Mouse Security research pertaining to RISC-V☆11Updated 8 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- Solutions and write-ups to challenges from Pwny Racing☆24Updated 5 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆50Updated 4 years ago
- Ghidra analyzer for UEFI firmware.☆19Updated 2 years ago
- Evaluation of two binary mutation engines based on ddisasm and rev.ng☆19Updated 2 years ago
- Files used for reproducing Fuzzware's experiments☆57Updated 2 years ago
- ☆186Updated 3 months ago