HE-Wenjian / iGPU-Leak
[CVE-2019-14615] iGPU Leak: An Information Leakage Vulnerability on Intel Integrated GPU
☆55Updated 4 years ago
Alternatives and similar repositories for iGPU-Leak:
Users that are interested in iGPU-Leak are comparing it to the libraries listed below
- Tool to extract the kallsyms (System.map) from a memory dump☆25Updated last year
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆19Updated 5 years ago
- ☆14Updated 2 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆27Updated 2 years ago
- ☆23Updated 4 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 5 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- Toshiba MeP-c4 for Ghidra☆22Updated 5 years ago
- An AFL scaling benchmarking tool☆18Updated 4 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- IDA Pro Python plugin to analyze and annotate Linux kernel alternatives☆22Updated 3 years ago
- ☆18Updated 3 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Updated 5 years ago
- Some tee/trustzone helper stuff☆51Updated 5 years ago
- QuickPatch: A patching tool☆13Updated 5 years ago
- Exploit generator for Intel ME 11 buffer overflow☆32Updated 5 years ago
- Tool for working with memory of a running Linux process☆12Updated 4 years ago
- keynote I gave at GreHack 2019☆18Updated 5 years ago
- ☆30Updated 6 years ago
- CVE-2017-5721 Proof-of-Concept☆17Updated 7 years ago
- ☆13Updated 5 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆16Updated 6 years ago
- JS modules for Frida based tools to add code coverage to your instrumentation scripts.☆25Updated 6 years ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 2 years ago
- CTF writeups☆9Updated 5 years ago
- ☆11Updated 4 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆31Updated 4 years ago
- Investigating the bug behind CVE-2021-26708☆27Updated 4 years ago
- Ditto.☆17Updated 4 years ago