(Inverse Path | F-Secure) Hardware Security Team - Security Advisories
☆24Dec 15, 2021Updated 4 years ago
Alternatives and similar repositories for advisories
Users that are interested in advisories are comparing it to the libraries listed below
Sorting:
- Abstraction layer for Xilinx FPGAs☆15Aug 9, 2019Updated 6 years ago
- syzkaller is an unsupervised coverage-guided kernel fuzzer☆13Oct 3, 2020Updated 5 years ago
- UPDATED: All the action is at https://github.com/xsscx/srd☆12Jul 12, 2021Updated 4 years ago
- Spen's Official OpenOCD Mirror (no pull requests)☆12Jan 27, 2020Updated 6 years ago
- IDA Python's idc.py <= 7.3 compatibility module☆21Oct 11, 2019Updated 6 years ago
- LiteX-based PCIe MITM, sniffing, fuzzing, device emulation☆19Feb 9, 2022Updated 4 years ago
- Hydradancer firmware supporting the Facedancer backend for the Hydradancer dongle and HydraUSB3☆23Dec 10, 2025Updated 2 months ago
- Tensilica Xtensa Architecture Plugin and ESP8266 Firmware Loader for Binary Ninja☆17Apr 8, 2023Updated 2 years ago
- ☆45Jul 19, 2023Updated 2 years ago
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆21Feb 9, 2023Updated 3 years ago
- extract various firmware blobs from iBoot☆48Oct 4, 2020Updated 5 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆18Jul 1, 2020Updated 5 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Oct 13, 2022Updated 3 years ago
- Script that checks for available updates for the most commonly used Digital Forensics tools☆60Dec 10, 2020Updated 5 years ago
- Research tools developed for Intel Wi-Fi chips☆57Jun 14, 2025Updated 8 months ago
- A lightweight ARM reverse engineering tool.☆24Jun 18, 2024Updated last year
- Library for reading IDA Pro databases.☆29May 1, 2021Updated 4 years ago
- SiLabs C8051F34x code protection bypass☆70Aug 19, 2021Updated 4 years ago
- Binary Ninja loader for A12 SEP firmware☆29Feb 4, 2021Updated 5 years ago
- Use Ghidra Structs in Python☆30Mar 28, 2021Updated 4 years ago
- Dynamic Analysis for Concurrent Programs☆27Jan 31, 2026Updated last month
- CodeHawk C Analyzer: sound static analysis of memory safety (undefined behavior)☆32Feb 26, 2026Updated last week
- ☆74Nov 19, 2022Updated 3 years ago
- A framework provides an interface to monitor and control fuzzers☆30Jul 5, 2023Updated 2 years ago
- iBoot/SecureROM Loader☆34Feb 24, 2023Updated 3 years ago
- ☆28Aug 26, 2025Updated 6 months ago
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆39Feb 25, 2026Updated last week
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Sep 4, 2022Updated 3 years ago
- ☆80Jun 7, 2024Updated last year
- symbol dumps of iOS shared caches☆34Oct 15, 2022Updated 3 years ago
- BADFET☆45Jul 12, 2017Updated 8 years ago
- Materials from the DEF CON 30 talk on PACMAN☆34Oct 28, 2022Updated 3 years ago
- Collection of LLVM passes and triage tools for use with the KRF fuzzer☆38Oct 12, 2022Updated 3 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Feb 27, 2018Updated 8 years ago
- Interprocess communication via a covert timing channel☆26Oct 24, 2025Updated 4 months ago
- ☆42Aug 5, 2021Updated 4 years ago
- Using LLVM Clang on Windows with CMake☆10Dec 4, 2021Updated 4 years ago
- macOS Endpoint Security Message Analysis Tool☆47Jan 31, 2022Updated 4 years ago
- Vulnerable code clone detection technique. Published in EuroS&P2020☆10Sep 4, 2020Updated 5 years ago