sec-consult / SEC-Xtractor_Hardware
☆30Updated 3 years ago
Alternatives and similar repositories for SEC-Xtractor_Hardware:
Users that are interested in SEC-Xtractor_Hardware are comparing it to the libraries listed below
- ☆21Updated 3 years ago
- nü-map: a somewhat-more-modern (expeirmental) derivative of umap2 for modern FaceDancer☆24Updated last year
- FPGA-based glitcher for the Digilent Arty FPGA development board.☆29Updated 7 years ago
- BADFET☆44Updated 7 years ago
- Raiden project☆23Updated 3 years ago
- Timing Sidechannel workshop☆29Updated 11 years ago
- The BUSSide Badge☆46Updated 3 years ago
- Resources for Fault Injection☆45Updated 11 months ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆43Updated 4 years ago
- cheap and terrible voltage glitcher hardware/software☆40Updated 5 years ago
- Software for Xmega-A1 Xplained board with MAX4619 glitch circuit☆40Updated 8 years ago
- Content related to hardware hacking☆47Updated 5 years ago
- A Serial IO programmer for Renesas M16C, includes security PIN bypass.☆81Updated 3 years ago
- scripts and examples for using JTAG debug tools to gain root access☆27Updated 8 years ago
- A framework for parsing binary data.☆16Updated 2 years ago
- ☆13Updated 4 years ago
- Simple voltage glitcher implementation for the Lattice iCEstick Evaluation Kit☆55Updated 5 years ago
- Firmware reverse-engineering tools for i.MX NAND flash☆49Updated 3 months ago
- The hydrabus framework core [Not maintained anymore - see readme]☆21Updated last year
- A GUI-based USB device fuzzer☆62Updated 7 years ago
- A Basic BBI Tool - So Simple, But So Good!☆28Updated 3 years ago
- JTAG enumeration tool written in Go. A port of https://github.com/cyphunk/JTAGenum enhanced with https://github.com/grandideastudio/jtagu…☆101Updated 8 months ago
- Python tool for dumping flash via uboot reliably☆27Updated 3 years ago
- IDA processor module for Renesas RX63 MCU☆13Updated last month
- Colin O'Flynn's Hacakday talk at Remoticon 2021 support repo.☆21Updated 3 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Updated 4 years ago
- Writeups for the RHME2 CTF☆11Updated 7 years ago
- Purposely Vulnerable Embedded Device☆22Updated 7 years ago
- Minimal UART client in Golang that dumps LPC1343 chips that are locked at CRP1.☆20Updated 3 years ago
- Abstraction layer for Xilinx FPGAs☆15Updated 5 years ago