tst-race / race-coreLinks
☆21Updated last year
Alternatives and similar repositories for race-core
Users that are interested in race-core are comparing it to the libraries listed below
Sorting:
- ☆88Updated last year
- GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers -- USENIX Security'24☆270Updated last year
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆103Updated last year
- CLI tool, Ghidra plug-in, and Haskell library for analyzing binaries using under-constrained symbolic execution☆125Updated last week
- A collection of Ghidra scripts, including the GPT-3 powered code analyser and annotator, G-3PO.☆311Updated 2 years ago
- Damn Vulnerable UEFI☆295Updated last year
- ☆129Updated 3 years ago
- Minimal setup to trigger the xz backdoor☆29Updated last year
- Training in Transient Execution and PhantomCALL, from Inception (SEC'23) Artifacts.☆41Updated last year
- Assured confidential execution (ACE) implements VM-based trusted execution environment (TEE) for embedded RISC-V systems with focus on a …☆193Updated last week
- An MCP extension for Ghidra☆383Updated 3 weeks ago
- Next-gen Rowhammer fuzzer that uses non-uniform, frequency-based patterns (IEEE S&P '22).☆242Updated last year
- easylkb - Easy Linux Kernel Builder☆365Updated last year
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆122Updated last month
- FlippyRAM is an automated framework for testing and analyzing Rowhammer vulnerabilities in DRAM. It combines rowhammer tools and supports…☆22Updated last month
- VSS Hardware Hacking Wiki and Blog Entries☆258Updated 2 years ago
- Code auditing productivity multiplier.☆465Updated 2 months ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆114Updated 2 years ago
- A CAD tool for extracting bits from Mask ROM photographs.☆367Updated last month
- ☆454Updated 3 years ago
- Fraktal's take on building an affordable Laser Fault Injection Rig☆91Updated last year
- Intel Management Engine JTAG Proof of Concept☆145Updated 5 years ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆242Updated last year
- a set of simple steps to get from "I don't know WTF BBQ" to "I am service provider"☆53Updated last year
- ☆20Updated last year
- The first analysis framework for CPU microcode☆410Updated 2 years ago
- A tool to explore USB-C on Apple devices using the Tamarin C Hardware.☆222Updated last year
- GSM+GPRS Radio Access Network Node reloaded for 2024-2025 for newest UHD drivers and supporting Ubuntu 22.04 & 24.04☆261Updated 5 months ago
- A U-Boot hacking toolkit for security researchers and tinkerers☆274Updated 2 years ago
- A secure, fast, and adaptable OS based on the seL4 microkernel☆197Updated this week