cromulencellc / hackasat-qualifier-2020Links
Open source release of challenges and other code used in the Hack-A-Sat Qualifier in 2020.
☆84Updated last year
Alternatives and similar repositories for hackasat-qualifier-2020
Users that are interested in hackasat-qualifier-2020 are comparing it to the libraries listed below
Sorting:
- Open source release of challenges and other code used in the 2020 Hack-a-Sat Final.☆83Updated 4 years ago
- Hack A Sat 2020 Qualifier Challenges☆102Updated 2 years ago
- Open source release of challenges and other code used in the Hack-A-Sat 2 Qualifier in 2021.☆67Updated 4 years ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆89Updated 2 years ago
- Hack-a-Sat 4 2023 - Finals Public Release☆51Updated last year
- Client side tools to play the CTS contest☆48Updated 4 years ago
- ☆27Updated 3 years ago
- DDS workshops at DEFCON☆77Updated 11 months ago
- ☆29Updated 2 years ago
- Hack-A-Sat Qualifiers Writeups☆252Updated 2 years ago
- A list of resources for those interested in hardware, embedded, and IoT security☆69Updated 9 months ago
- Public library of space documents and tutorials☆795Updated last year
- A collection of learning resources for budding aviation security researchers☆93Updated 4 years ago
- hackasat-qualifier-2023☆26Updated 2 years ago
- ☆18Updated 2 years ago
- ADDVulcan 2020 Hack-A-Sat writeups☆27Updated 2 years ago
- List of the tools and usage☆234Updated 2 weeks ago
- Damn Vulnerable IoT Device☆211Updated last year
- Contains all the components necessary to run a DC finals (attack-defense CTF) game from OOO.☆55Updated 3 years ago
- Content related to hardware hacking☆53Updated 6 years ago
- FAUST Gameserver for attack-defense CTFs☆78Updated this week
- Riscure Hack Me embedded hardware CTF 2017-2018.☆88Updated 7 years ago
- Advanced: Bluetooth low energy capture the flag☆58Updated last year
- In service of posteriority☆45Updated 3 years ago
- ☆77Updated last year
- Pwn2Win 2020 Challenges☆55Updated 4 years ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆423Updated 3 years ago
- 基于 SDR 开源方案& 商业授权方案 实现 2-5G 安全研究的一些资源整合☆109Updated last month
- Hands-on workshop on the basics of hardware hacking.☆122Updated last year
- ☆20Updated 3 years ago