Skip to content

Commit

Permalink
Adding FUNDING.yml
Browse files Browse the repository at this point in the history
  • Loading branch information
swisskyrepo committed Oct 31, 2024
1 parent b5ba154 commit 4c3f9e4
Show file tree
Hide file tree
Showing 2 changed files with 5 additions and 1 deletion.
4 changes: 4 additions & 0 deletions .github/FUNDING.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
# These are supported funding model platforms
github: swisskyrepo
ko_fi: swissky
custom: https://www.buymeacoffee.com/swissky
2 changes: 1 addition & 1 deletion docs/side-channel/fault-injection.md
Original file line number Diff line number Diff line change
Expand Up @@ -48,7 +48,7 @@ print(ser.read(3))
gpio glitch trigger PB0 pin PC15 length 100 offsets 191200
gpio glitch trigger PB0 pin PC15 length 100 offsets 191300
```
* [Fiesta - Riscure Hardware CTF 2016](https://github.com/hydrabus/rhme-2016/blob/master/FaultInjection/Fiesta.md)
* [Hardware Power Glitch Attack (Fault Injection) - rhme2 Fiesta (FI 100)](https://youtu.be/6Pf3pY3GxBM) - solved using a [custom code](https://gist.github.com/LiveOverflow/cad0e905691ab5a8a2474d483a604d67) running on a Xilinx FPGA
* [AVR Glitch: Modifying Code Execution Paths Using Only Voltage](https://flawed.net.nz/2017/01/29/avr-glitch-modifying-code-execution-paths-using-only-voltage/)
* [Hextree Glitch Tag](https://1bitsquared.de/products/glitch-tag) - The Hextree GlitchTag is a "totally not AirTag inspired" board for the nRF52832 microcontroller. It is intended as a target for the Hextree Faultier. It gives access to all pins that you need to learn basic fault-injection, including glitch characterization and so on. It also allows you to reproduce LimitedResult's APPROTECT bypass (that was also used to hack the AirTags) without needing to microsolder!
Expand Down

0 comments on commit 4c3f9e4

Please sign in to comment.