HexHive / GlobalConfusion
TrustZone Trusted Application 0-Days by Design
☆18Updated 4 months ago
Alternatives and similar repositories for GlobalConfusion:
Users that are interested in GlobalConfusion are comparing it to the libraries listed below
- ☆34Updated 10 months ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago
- A tool to perform so called BGE attack☆24Updated 11 months ago
- ☆23Updated last month
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆26Updated last month
- A MBR Fuzzer☆29Updated 11 months ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- ☆11Updated 5 months ago
- Here I store my proof of concepts☆14Updated 6 months ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆27Updated 2 years ago
- Binary code coverage visualizer plugin for Ghidra - just without crashes on unknown insns☆19Updated 5 months ago
- ☆23Updated 2 months ago
- Diaphora Machine Learning tools and datasets☆20Updated 6 months ago
- ☆19Updated 2 years ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆18Updated 2 weeks ago
- ☆32Updated last year
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆36Updated 3 months ago
- Exploits for CVE-2023-27327 and CVE-2023-27328☆14Updated last year
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆41Updated 3 years ago
- BINARLY Research Tools and PoCs☆36Updated 6 months ago
- javascript extension of windbg for hacker.☆15Updated last year
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆13Updated 3 months ago
- weggli ruleset scanner for source code and binaries☆26Updated 3 months ago
- ☆30Updated 2 months ago
- Exploits for a heap overflow in MiniDLNA <=1.3.2 (CVE-2023-33476)☆15Updated last year
- This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.☆47Updated 6 months ago
- ☆38Updated 5 months ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- Python bindings for BochsCPU☆35Updated last month
- ☆12Updated 2 years ago