☆31Mar 11, 2021Updated 4 years ago
Alternatives and similar repositories for SEC-Xtractor_Hardware
Users that are interested in SEC-Xtractor_Hardware are comparing it to the libraries listed below
Sorting:
- ☆21Mar 11, 2021Updated 4 years ago
- Abstraction layer for Xilinx FPGAs☆15Aug 9, 2019Updated 6 years ago
- Python scripts for CAN Bootstrap Loader (BSL) for Tricore 1796☆25Jan 20, 2023Updated 3 years ago
- A ruby library implementation of EMI/UCP protocol for SMS☆13Jun 28, 2021Updated 4 years ago
- JE3HHT 森OMが作成された、Windows上で動作するアンテナ設計解析プログラムです。☆12Dec 16, 2017Updated 8 years ago
- A collection of resources for the 68HC11 microcontroller.☆17Oct 9, 2022Updated 3 years ago
- Anvil Secure's Burp extension for signing AWS requests with SigV4☆21Aug 20, 2025Updated 6 months ago
- GCC 4.9.4/Binutils 2.20/Newlib Source code for Tricore Aurix☆23Feb 18, 2022Updated 4 years ago
- Radio hardware and software projects.☆27May 24, 2016Updated 9 years ago
- Avatar² examples showcased in "Avatar²: A Multi-target Orchestration Platform"☆18Feb 7, 2018Updated 8 years ago
- Collection of RH850 Glitches☆60Aug 17, 2025Updated 6 months ago
- Test Interface for Multiple Embedded Protocols☆24May 14, 2020Updated 5 years ago
- Helper scripts, cross-compilation-files, makefile shims, and other helpful tools for working with CMake☆24Mar 5, 2025Updated last year
- Nix the planet!☆38Feb 24, 2026Updated last week
- ☆27Jul 31, 2021Updated 4 years ago
- ☆11Feb 14, 2023Updated 3 years ago
- Source code for the HorrorScope and material for the ScaCheapier workshop☆25Dec 24, 2019Updated 6 years ago
- ☆28May 14, 2020Updated 5 years ago
- An arduino project that will read ROM chips☆28Mar 2, 2017Updated 9 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Nov 17, 2015Updated 10 years ago
- ☆30Dec 4, 2021Updated 4 years ago
- Utilities for the Tzumi Magic TV device☆31Jun 9, 2018Updated 7 years ago
- GCC plugins☆29Jul 29, 2011Updated 14 years ago
- Cybersecurity Incidents Mind Maps☆34Sep 29, 2021Updated 4 years ago
- Any presentation we've given at FortyNorth Security☆33Sep 27, 2021Updated 4 years ago
- A Python program that plots Bode diagrams of a component using a Rigol DS1054Z and a JDS6600☆38Dec 15, 2020Updated 5 years ago
- Material for a tutorial on Bayesian analysis of survey data☆12Dec 30, 2025Updated 2 months ago
- System Validation Platform☆12Sep 18, 2025Updated 5 months ago
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 3 months ago
- BADFET☆45Jul 12, 2017Updated 8 years ago
- Working with the 13 dollar Tzumi MagicTV.☆38Jun 8, 2018Updated 7 years ago
- Remote / Onsite Security Assessment Jumpkit☆39Aug 5, 2023Updated 2 years ago
- ☆81May 20, 2022Updated 3 years ago
- Locates Honeywell/Tridium/Niagara HVAC JACEs/Controllers via HTTP fingerprints/strings. Very handy for vulnerability/pentesting.☆43Jan 9, 2017Updated 9 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- P2P Mesh C2 framework (C implants + Python server + Dashboard) for resilient red‑team ops☆12Aug 22, 2025Updated 6 months ago
- Generating short scary stories through language model.☆14Apr 28, 2025Updated 10 months ago
- Bruteratel☆13Oct 26, 2022Updated 3 years ago
- Applications and utilities for model developers to use in conjunction with the OTM-DE.☆10Apr 1, 2024Updated last year