sec-consult / SEC-Xtractor_HardwareView external linksLinks
☆31Mar 11, 2021Updated 4 years ago
Alternatives and similar repositories for SEC-Xtractor_Hardware
Users that are interested in SEC-Xtractor_Hardware are comparing it to the libraries listed below
Sorting:
- ☆20Dec 21, 2020Updated 5 years ago
- ☆10Mar 3, 2024Updated last year
- Python scripts for CAN Bootstrap Loader (BSL) for Tricore 1796☆25Jan 20, 2023Updated 3 years ago
- JE3HHT 森OMが作成された、Windows上で動作するアンテナ設計解析プログラムです。☆12Dec 16, 2017Updated 8 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Aug 11, 2020Updated 5 years ago
- Code for blog series starting at http://tty.uchuujin.de/2016/02/stm32-from-scratch-bare-minimals/☆11Nov 22, 2020Updated 5 years ago
- ☆13May 9, 2021Updated 4 years ago
- Java code for CFS2160 Programming Stream 2019/20☆10Jan 16, 2020Updated 6 years ago
- A repository with sample source code for the American Trucking Association's Technology and Maintenance Council (TMC) RP1210 Window Comm…☆20Jun 30, 2019Updated 6 years ago
- A collection of resources for the 68HC11 microcontroller.☆17Oct 9, 2022Updated 3 years ago
- Cerberus is another simple stressing tool simulating DDoS attacks.☆21Mar 13, 2025Updated 11 months ago
- Avatar² examples showcased in "Avatar²: A Multi-target Orchestration Platform"☆18Feb 7, 2018Updated 8 years ago
- Nix the planet!☆35Feb 4, 2026Updated last week
- unofficial grsecurity gpl release☆24Dec 18, 2018Updated 7 years ago
- Extensible ARM CMSIS SVD spec based, multi-language source code generator☆18Jan 1, 2016Updated 10 years ago
- Collection of RH850 Glitches☆60Aug 17, 2025Updated 5 months ago
- ☆21Apr 27, 2020Updated 5 years ago
- ☆27Jul 31, 2021Updated 4 years ago
- Exploit Development: Case Studies 🔮☆25Jun 10, 2018Updated 7 years ago
- Source code for the HorrorScope and material for the ScaCheapier workshop☆25Dec 24, 2019Updated 6 years ago
- ☆11Feb 14, 2023Updated 3 years ago
- RayV Lite LFI & LLSI project support files.☆36Feb 6, 2026Updated last week
- Operation Wocao - Indicators of Compromise☆30Dec 19, 2019Updated 6 years ago
- Arduino PBOC Library using MFRC522☆11Jul 27, 2017Updated 8 years ago
- Any presentation we've given at FortyNorth Security☆34Sep 27, 2021Updated 4 years ago
- GCC plugins☆29Jul 29, 2011Updated 14 years ago
- Cybersecurity Incidents Mind Maps☆34Sep 29, 2021Updated 4 years ago
- scripts and examples for using JTAG debug tools to gain root access☆27Aug 15, 2016Updated 9 years ago
- System Validation Platform☆12Sep 18, 2025Updated 4 months ago
- A thin async wrapper for SQLAlchemy sessions☆10Sep 13, 2021Updated 4 years ago
- Material for a tutorial on Bayesian analysis of survey data☆12Dec 30, 2025Updated last month
- BADFET☆45Jul 12, 2017Updated 8 years ago
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 2 months ago
- Remote / Onsite Security Assessment Jumpkit☆39Aug 5, 2023Updated 2 years ago
- FW dump of the CMF Watch Pro 2☆45Aug 29, 2024Updated last year
- ☆81May 20, 2022Updated 3 years ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆86Mar 22, 2024Updated last year
- Fix missing Linux firmware kernel modules!☆17Jan 1, 2024Updated 2 years ago
- Generating short scary stories through language model.☆13Apr 28, 2025Updated 9 months ago