- Italy
Highlights
- Pro
Lists (8)
Sort Name ascending (A-Z)
Stars
3rd Party Indoor Location using ESP8266/ESP32 and Find3 (https://github.com/schollz/find3)
An Instagram Xposed module with features like Developer Options, Ghost Mode, Ad-Free browsing, and Distraction-Free Mode.
JingMatrix / LSPatch
Forked from LSPosed/LSPatchLSPatch: A non-root Xposed framework extending from LSPosed
OpenROAD's unified application implementing an RTL-to-GDS Flow. Documentation at https://openroad.readthedocs.io/en/latest/
The C-based Firmware Patching Framework for Broadcom/Cypress WiFi Chips that enables Monitor Mode, Frame Injection and much more
CADAM is the open source text-to-CAD web application
Run Windows apps on 🐧 Linux with ✨ seamless integration
A cheap and easy solution to make your electricity meter smarter
An integrated power, area, and timing modeling framework for multicore and manycore architectures
[CoRL '23] Dexterous piano playing with deep reinforcement learning.
TEMPEST-LoRa: Cross-Technology Covert Communication
The parent project for OpenZiti. Here you will find the executables for a fully zero trust, application embedded, programmable network @OpenZiti
Fuzzing processor simulations with taint tracking.
InSpectre Gadget: in-depth inspection and exploitability analysis of Spectre disclosure gadgets
Assured confidential execution (ACE) implements VM-based trusted execution environment (TEE) for embedded RISC-V systems with focus on a formally verified and auditable firmware.
Revizor - a fuzzer to search for microarchitectural leaks in CPUs
🪐 Markdown with superpowers — from ideas to papers, presentations and books.
A collection of mobile networking tools and resources for the UK and the rest of the world.
Python API for Tuya WiFi smart devices using a direct local area network (LAN) connection or the cloud (TuyaCloud API).
Low-Level Software Security for Compiler Developers
Spike, a RISC-V ISA Simulator
WebExtensions for restoring and saving window / tab states
Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and defence technologies
Proof-of-concept implementation for the paper "A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs" (IEEE S&P 2023)