HexPADS, a host-based, Performance-counter-based Attack Detection System
☆41Sep 6, 2022Updated 3 years ago
Alternatives and similar repositories for HexPADS
Users that are interested in HexPADS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mass Android app vulnerability analysis toolkit☆13Dec 6, 2016Updated 9 years ago
- [UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack☆63Nov 4, 2017Updated 8 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆37Feb 24, 2016Updated 10 years ago
- Source code for DABANGG attack.☆10Mar 26, 2022Updated 3 years ago
- ☆19Jun 20, 2020Updated 5 years ago
- This repository contains examples of Flush+Flush cache attacks☆170Oct 12, 2021Updated 4 years ago
- Repo for the paper "USB Devices phoning home"☆22Feb 12, 2016Updated 10 years ago
- Some slides from some presentations I have given☆25Jan 2, 2016Updated 10 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Oct 3, 2015Updated 10 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆65Sep 15, 2015Updated 10 years ago
- IDAPython plugin for finding Xrefs from a function☆48Jul 14, 2016Updated 9 years ago
- browser narlyness☆50Dec 11, 2013Updated 12 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 8 years ago
- Binary Analysis Platform -- I will try to keep this updated with patches, fixes, etc.☆33Oct 1, 2014Updated 11 years ago
- Malware analysis using Docker project☆25Mar 3, 2016Updated 10 years ago
- Run a windows process with many inputs and catch exit codes☆14Jan 5, 2016Updated 10 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- ☆10Feb 18, 2016Updated 10 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- My minimal PoC for spectre☆40Jan 8, 2018Updated 8 years ago
- IDA Pro MSDN Helper☆39Sep 5, 2016Updated 9 years ago
- Generic server for collaborative code analysis☆13Dec 19, 2016Updated 9 years ago
- This repository contains several tools to perform Cache Template Attacks☆165Nov 11, 2025Updated 4 months ago
- Intercept arbitrary functions at run-time, without knowing their typedefs☆88Apr 13, 2017Updated 8 years ago
- A bookmarklet that shows the ordering on the directed edges of your facebook friends☆30Mar 28, 2013Updated 12 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- Autocomplete functionallity for PHPUnit assertions.☆18Aug 9, 2023Updated 2 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Feb 13, 2017Updated 9 years ago
- capstone based disassembler for extracting to binnavi☆229Jun 8, 2016Updated 9 years ago
- ☆198Jun 12, 2024Updated last year
- Code to evaluate XLATE attacks as well existing cache attacks.☆31Aug 17, 2018Updated 7 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Rewrite of the Angular tutorial in React☆16May 7, 2014Updated 11 years ago
- ☆15Aug 11, 2014Updated 11 years ago
- A framework that correlates Bro events☆18Oct 25, 2013Updated 12 years ago
- CTF Writeups☆10Nov 7, 2016Updated 9 years ago
- Sample code for ret2usr (and ret2dir) kernel attacks☆10Nov 23, 2016Updated 9 years ago