Fuzzing Secure Monitor Implementations
☆19Aug 3, 2024Updated last year
Alternatives and similar repositories for EL3XIR
Users that are interested in EL3XIR are comparing it to the libraries listed below
Sorting:
- TrustZone Trusted Application 0-Days by Design☆25May 9, 2025Updated 9 months ago
- Trusted I/O Paths for SGX Enclaves☆18Apr 30, 2020Updated 5 years ago
- The published code repo for the Cortex-M SoK paper.☆27Feb 5, 2026Updated 3 weeks ago
- ☆26Nov 8, 2023Updated 2 years ago
- ARM CCA support for QEMU. Check wiki for instructions. https://github.com/Huawei/Huawei_CCA_RMM/wiki☆28Apr 15, 2023Updated 2 years ago
- SCTF 2023 kernel pwn && CVE-2023-3640☆29Jul 17, 2023Updated 2 years ago
- aarch64 thin hypervisor for resource aggregation☆37Apr 7, 2025Updated 10 months ago
- Breaking Confidential VMs with Malicious Interrupts (USENIX Security 2024)☆33May 3, 2024Updated last year
- Cradlepoint ECM Command Line Interface☆11Mar 7, 2023Updated 2 years ago
- Linux kernel source tree☆10Oct 11, 2017Updated 8 years ago
- Implementation of an X86 mini OS from scratch. Reference: https://github.com/yyu/osfs00☆11Jan 9, 2023Updated 3 years ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Oct 16, 2025Updated 4 months ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated last month
- Pseudo-Intel-CET functionality plugin based on QEMU 8.2.2 plugin system, with minor modifications to QEMU TCG body code to adapt to Glibc…☆14Jun 5, 2024Updated last year
- Fork of QEMU with Virtual Machine Introspection patches☆14Sep 13, 2023Updated 2 years ago
- ACI-GetStarted☆11Jun 4, 2025Updated 9 months ago
- VM migration related toolset☆12Dec 24, 2025Updated 2 months ago
- Integration fork of QEMU focusing on XNU platforms (arm, aarch64, etc)☆12Dec 12, 2022Updated 3 years ago
- For our ISSTA'23 paper ACETest: Automated Constraint Extraction for Testing Deep Learning Operators☆13Mar 30, 2024Updated last year
- Shadow Attack, LiRA, Quantile Regression and RMIA implementations in PyTorch (Online version)☆14Nov 8, 2024Updated last year
- ☆20Updated this week
- Dev resources of Harmony☆15Mar 4, 2024Updated 2 years ago
- Microbenchmarks for x86_64 kernel entry methods☆20Feb 21, 2022Updated 4 years ago
- Creates statically linked python 3/2 with cross compilation☆11Jan 18, 2025Updated last year
- 最新漏洞收集、复现、漏洞环境☆10Mar 21, 2019Updated 6 years ago
- Dockerfiles☆11Nov 26, 2025Updated 3 months ago
- A simple Mali 6xx/7xx register interface model that doesn't do any rendering.☆13Jan 29, 2016Updated 10 years ago
- A fork of Yosys that integrates the CellIFT pass☆13Jul 23, 2025Updated 7 months ago
- The ICS^2 Matrix is a threat taxonomy for Programmable Logic Controllers and Industrial Control Systems☆13Sep 10, 2024Updated last year
- compatible library for ebpf programs to improve BTF portability☆14Oct 11, 2023Updated 2 years ago
- Auto WHU for standard linux distributions i.e. Arch Linux, Ubuntu, etc. With systemd in mind, this version is much more concise than the …☆10Mar 19, 2021Updated 4 years ago
- wannabe (up-to-date) 64bit port of lguest☆14May 11, 2011Updated 14 years ago
- Centos6/7一键清理内核☆10Mar 10, 2020Updated 5 years ago
- A PDF that shows its own MD5☆11Jan 2, 2023Updated 3 years ago
- ☆12Apr 1, 2025Updated 11 months ago
- ☆10Dec 26, 2023Updated 2 years ago
- Device Tree Compiler for Windows☆15Aug 9, 2024Updated last year
- unruggable app compatible and standalone esp32 hardware signer☆18Aug 18, 2025Updated 6 months ago
- 国密算法sm1,sm2,sm3,sm4算法源码☆12Feb 19, 2018Updated 8 years ago