usbarmory / mxc-scc2Links
NXP Security Controller (SCCv2) - Linux driver
☆19Updated 11 months ago
Alternatives and similar repositories for mxc-scc2
Users that are interested in mxc-scc2 are comparing it to the libraries listed below
Sorting:
- Password manager for USB Armory☆37Updated 10 years ago
- utility for emulating a USB HID keyboard with the USBArmory☆44Updated 7 years ago
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- Qubes Split GPG configuration for qubes-gpg-server over TCP☆21Updated last year
- USB armory Debian base image☆84Updated 2 months ago
- Mirror of freehaven's anonymous research bibliography☆14Updated 10 years ago
- Open tools for side-channel analysis and related techniques. Currently, this repository contains: 1) A near-field EM probe amplifier circ…☆37Updated 11 years ago
- Base OpenXT build scripts☆51Updated 4 years ago
- USB armory - Mass Storage firmware☆24Updated 5 months ago
- Fun with the TLS handshake☆31Updated 11 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- USB armory - boot loader☆39Updated 3 weeks ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- Command-line utility to control Tor.☆90Updated 2 years ago
- an open source toolkit for PCI bus exploration☆72Updated 9 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- ☆30Updated 10 years ago
- Syscall Firewalls for VM Isolation☆11Updated 8 years ago
- stuff from my ToorCon 2015 talk☆15Updated 10 years ago
- A tool (and library) for TACKs☆29Updated 8 years ago
- hid emulation tools for the usbarmory☆68Updated 9 years ago
- It contains hardenedlinux community documentation.☆60Updated 2 years ago
- opmsg p2p transport network☆75Updated 7 years ago
- ☆59Updated 11 years ago
- Repo for the paper "USB Devices phoning home"☆22Updated 9 years ago
- lte security☆42Updated 10 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- ☆25Updated 10 years ago
- Analysis of archived Tor relay RSA public keys☆24Updated 8 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago