abdulkadir-gungor topic
verilator
Verilator open-source SystemVerilog simulator and lint system
JPGtoMalware
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in t...
f4pga-arch-defs
FOSS architecture definitions of FPGA hardware useful for doing PnR device generation.
MIPS-Processor
5-stage pipelined 32-bit MIPS microprocessor in Verilog
HtmlSmuggling
HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web page. The malicious script decodes and deploys the p...
ZIPtoMalware
It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executable or payload in the zip/rar file without any action. In this w...
my-verilog-examples
A place to keep my synthesizable verilog examples.
Traffic-Light-Controller-using-Verilog
the project includes system design of a t intersection traffic light controller and its verilog code in vivado design suite.
Shodan_Search
Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.