TECH

Colorlight-RisCV-RS : Hacking Chinese LED Displays With Rust, RISC-V, And Open-Source FPGA Tools

Dive into the world of colorlight-riscv-rs, where we embark on an exciting journey to manipulate Chinese LED display boards using cutting-edge technologies.

Join us as we explore the fusion of Rust, RISC-V, and open-source FPGA tools to unlock new possibilities in hardware hacking and innovation.

Overview

my (ongoing) adventure on trying to control a

with rust and open source tools (yosys, nextpnr, prjtrellis and openFPGALoader).

Layout

  • soc – files for building & flashing the fpga with the risc-v soc
  • litex-pac – the peripheral access crate (pac), generated via svd2rust
  • firmware – the firmware that will run

each directory should have a readme.md with more in-depth instructions

Firmware In C

you can check this repo for a similar example, but flashing a C firmware.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Admin Panel Dorks : A Complete List of Google Dorks

Introduction Google Dorking is a technique where advanced search operators are used to uncover information…

18 hours ago

Log Analysis Fundamentals

Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…

2 days ago

Networking Devices 101: Understanding Routers, Switches, Hubs, and More

What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…

2 days ago

Sock Puppets in OSINT: How to Build and Use Research Accounts

Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…

2 days ago

What is SIEM? Complete Guide to Security Information and Event Management

Introduction As cyber threats grow more sophisticated, organizations need more than just firewalls and antivirus…

3 days ago

Website OSINT: Tools and Techniques for Reconnaissance

Introduction When it comes to cybersecurity and ethical hacking, one of the most effective ways…

3 days ago