0xADE1A1DE / AssemblyLineLinks
A C library and binary for generating machine code of x86_64 assembly language and executing on the fly without invoking another compiler, assembler or linker.
☆190Updated 4 months ago
Alternatives and similar repositories for AssemblyLine
Users that are interested in AssemblyLine are comparing it to the libraries listed below
Sorting:
- Arbitrary Speculative Code Execution with Return Instructions☆160Updated last year
- This repository contains exploit and reverse-engineering source code regarding the Spectre-BHB/Branch History Injection vulnerability☆117Updated 3 years ago
- ☆161Updated 6 months ago
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆159Updated 2 years ago
- A fast and lightweight decoder for x86 and x86-64 and encoder for x86-64.☆187Updated 2 months ago
- x86 OS development using Bochs emulator. MIT xv6, JamesM's kernel development tutorials (with some changes) & more☆82Updated last year
- x86 and amd64 instruction reference manual pages☆258Updated 5 years ago
- ☆78Updated 4 years ago
- A small library to modify all page-table levels of all processes from user space for x86_64 and ARMv8.☆260Updated 2 months ago
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆74Updated 2 years ago
- Tiny loaders for various binary formats.☆238Updated 9 years ago
- A super simple RV32i JIT, designed for ease of understanding and modification☆85Updated 2 years ago
- Kernel Fuzzer for Xen Project (KF/x) - Hypervisor-based fuzzing using Xen VM forking, VMI & AFL☆473Updated 11 months ago
- A binary optimization/specialization library supporting multiple rewriters☆114Updated 4 years ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆70Updated last year
- X86 Opcode and Instruction Reference☆244Updated last year
- userland exec for Linux x86_64☆67Updated 3 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- Kernel Test Framework☆143Updated 5 months ago
- Docs and resources on CPU Speculative Execution bugs☆375Updated 7 years ago
- A Secure and Memory-Efficient Heap Allocator☆33Updated last year
- ☆112Updated last year
- Why fuzzing with emulators is amazing☆138Updated 4 years ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆82Updated 2 years ago
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆61Updated 10 months ago
- An awesome & curated list of binary rewriting papers☆243Updated 3 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆75Updated 5 years ago
- Website and PoC collection for transient execution attacks☆184Updated last year
- The first analysis framework for CPU microcode☆394Updated 2 years ago
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆442Updated last year