TrustworthyComputing / csaw_esc_2020Links
CSAW Embedded Security Challenge 2020
☆27Updated 4 years ago
Alternatives and similar repositories for csaw_esc_2020
Users that are interested in csaw_esc_2020 are comparing it to the libraries listed below
Sorting:
- CSAW Embedded Security Challenge 2019☆34Updated 5 years ago
- An open-source deterministic fault attack simulator prototype☆60Updated 4 years ago
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- ☆36Updated 4 years ago
- FirmWire has replaced ShannonEE. OLD: A dynamic analysis environment for Samsung's Shannon baseband.☆42Updated 3 years ago
- Writeups for the RHME3 Challenges☆52Updated 6 years ago
- ☆188Updated 5 months ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 3 years ago
- CLKscrew Code and Scripts☆28Updated 5 years ago
- A firmware base address search tool.☆43Updated last year
- A code skeleton of Samsung's Shannon S5000 baseband modem.☆45Updated 5 years ago
- Files used for reproducing Fuzzware's experiments☆60Updated 2 years ago
- Migrated to Codeberg☆47Updated 4 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- Makes Unicorn traces. Generic Side-Channel and Fault Injection simulator☆187Updated last week
- Cross-architecture instruction counting for CTF solving☆47Updated 3 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆163Updated 4 years ago
- Repo for storing CTF related stuff (Writeups, etc.)☆51Updated last year
- Lepton is a Lightweight ELF Parsing Tool that was designed specifically for analyzing and editing binaries with damaged or corrupted ELF …☆35Updated 4 years ago
- Stuff from CTF contests☆39Updated 6 years ago
- FLUFFI (Fully Localized Utility For Fuzzing Instantaneously) - A distributed evolutionary binary fuzzer for pentesters☆101Updated 3 years ago
- Riscure Hack Me embedded hardware CTF 2017-2018.☆88Updated 7 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆123Updated 8 years ago
- CTF writeups☆43Updated 3 years ago
- Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks☆37Updated 4 years ago
- Curated collection of resources, examples and scripts for Linux kernel devs, researchers and hobbyists.☆59Updated 2 years ago
- Debugger for the Shannon Baseband☆58Updated 5 years ago
- LKRG bypass methods☆72Updated 5 years ago
- Interface GDB-GEF with Binary Ninja☆58Updated 4 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago