pcileech-fpga

DMA attack tool

Provides hardware and software components for performing DMA attacks on PCs using FPGAs

FPGA modules used together with the PCILeech Direct Memory Access (DMA) Attack Software

GitHub

908 stars
46 watching
200 forks
Language: Verilog
last commit: 3 months ago

Related projects:

Repository Description Stars
pwmarcz/fpga-tools A collection of Verilog modules and tools for designing and working with FPGAs 8
carmaa/inception A tool for manipulating memory on compromised computers using DMA-based attacks 1,573
pulp-platform/idma A modular data movement accelerator designed to support various platforms and protocols 91
idiom/pftriage Tool to analyze files during malware analysis and triage by extracting properties and detecting malicious indicators. 77
optiv/microsoft365_devicephish A tool designed to demonstrate a vulnerability in Microsoft's OAuth Authorization Flow for phishing attacks 92
bluespec/awsteria_infra Middleware for running applications on both host computers and attached FPGAs 17
ulixxe/usb_dfu A Verilog implementation of the USB Device Class Specification for Device Firmware Upgrade (DFU) functionality. 16
mmicko/fpga101-workshop A comprehensive collection of tools and materials for learning Field Programmable Gate Arrays (FPGAs) and related technologies 71
chipsalliance/fpga-tool-perf Analyzes performance of tools used in Field-Programmable Gate Arrays (FPGAs) 102
dynetics/malfunction Tools for analyzing and comparing malware at a function level using fuzzy hashing algorithms 191
ffleming/timing_attack A tool to perform timing attacks on web applications by measuring response times of input variations. 120
nvdla/hw The NVDLA project provides hardware designs and tools for building deep learning inference accelerators. 1,744
machdyne/riegel An FPGA-based computer platform with customizable gateware and bootloaders 17
wuch15/fedattack An implementation of an adversarial attack method in federated learning 11
anssi-fr/dfir4vsphere A PowerShell module for collecting logs and forensics data from VMware vSphere environments. 140