External links to paper describing exploit and files.
External link to Pico Pwner, Raspberry Pi Pico implementation of the attack.
Mirrored paper and files. Mirrored Pico Pwner.