TrustworthyComputing / csaw_esc_2023Links
☆16Updated last month
Alternatives and similar repositories for csaw_esc_2023
Users that are interested in csaw_esc_2023 are comparing it to the libraries listed below
Sorting:
- Automatic tool to quickly start a pwn CTF challenge☆45Updated last year
- A Python library to debug binary executables, your own way.☆254Updated last week
- A list of resources for the talk Rowhammer Revisited: From Exploration to Exploitation and Mitigation☆12Updated last year
- Resources to getting started vulnerability research on IoT/embedded devices.☆77Updated 2 weeks ago
- GEF - GDB Enhanced Features for exploit devs & reversers☆528Updated last week
- ☆114Updated 2 years ago
- A curated list of awesome side-channel attack resources☆89Updated last month
- ☆19Updated last year
- ☆26Updated 8 months ago
- Write-ups for various CTF☆193Updated last year
- ☆105Updated last year
- Interactive ChipWhisperer tutorials using Jupyter notebooks.☆291Updated 4 months ago
- ropr with some tweaks for better linux kernel support☆23Updated 4 months ago
- kernel-pwn and writeup collection☆645Updated last year
- Library for Prime+Probe cache side-channel attacks on L1 and L2☆35Updated 5 years ago
- The open-source component of Prime+Scope, published at CCS 2021☆34Updated 2 years ago
- The first AVR32 impelmentation for QEMU☆42Updated last year
- Source code of the challenges developed for the 2024 edition of openECSC☆73Updated 11 months ago
- VirtuAlization GDb integrations in pwntools☆35Updated 3 weeks ago
- find relevant security papers published in the top-4 conferences (S&P, USENIX, CCS, NDSS)☆187Updated last year
- Fuzzware's main repository. Start here to install.☆348Updated last month
- ☆326Updated last year
- An archive of past challenges from LA CTF hosted by ACM Cyber at UCLA and Psi Beta Rho.☆138Updated 6 months ago
- Repository for monolithic firmware blobs☆84Updated 3 years ago
- Side-Channel Analysis Library☆96Updated last week
- 🎁A convenient glibc binary and debug file downloader and source code auto builder☆21Updated 6 months ago
- knowledge is power☆225Updated 3 weeks ago
- Kernel development & exploitation practice environment.☆233Updated last year
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆16Updated last year
- Symbolic debugger☆22Updated 5 months ago