HexHive / GlobalConfusion
TrustZone Trusted Application 0-Days by Design
☆19Updated last week
Alternatives and similar repositories for GlobalConfusion
Users that are interested in GlobalConfusion are comparing it to the libraries listed below
Sorting:
- A tool to perform so called BGE attack☆24Updated last year
- ☆34Updated 11 months ago
- ☆26Updated 3 months ago
- ☆8Updated last year
- Diaphora Machine Learning tools and datasets☆21Updated 7 months ago
- ☆19Updated 2 years ago
- ☆33Updated last year
- Binary code coverage visualizer plugin for Ghidra - just without crashes on unknown insns☆19Updated 6 months ago
- ☆32Updated last month
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago
- weggli ruleset scanner for source code and binaries☆29Updated 4 months ago
- CVE-2024-53691☆11Updated 4 months ago
- Here I store my proof of concepts☆14Updated 8 months ago
- Dynamic-Static binary instrumentation framework on top of GDB☆52Updated last year
- Browser exploitation v8 and sandbox escape challenges with solutions.☆27Updated 3 years ago
- poc code for CVE-2024-38080☆30Updated 8 months ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆36Updated 5 months ago
- ☆14Updated 2 years ago
- Python interface for Binexport, the Bindiff export format☆16Updated this week
- javascript extension of windbg for hacker.☆15Updated last year
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆13Updated 5 months ago
- Overview of Microsoft Patch Tuesday☆14Updated 8 months ago
- ☆11Updated 3 years ago
- Python bindings for BochsCPU☆35Updated 2 months ago
- BINARLY Research Tools and PoCs☆36Updated 7 months ago
- This repository contains multiple exploits I have written for various CVEs and CTFs☆25Updated 11 months ago
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆51Updated 2 years ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆31Updated 3 months ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆18Updated 2 months ago
- ☆12Updated 7 months ago