IAIK / ZombieLoad
Proof-of-concept for the ZombieLoad attack
☆813Updated 3 years ago
Alternatives and similar repositories for ZombieLoad:
Users that are interested in ZombieLoad are comparing it to the libraries listed below
- ☆467Updated 2 months ago
- VirtualBox E1000 Guest-to-Host Escape☆1,404Updated 6 years ago
- RIDL test suite and exploits☆353Updated 4 years ago
- Avast JavaScript Interactive Shell☆667Updated 4 years ago
- Hardware backdoors in some x86 CPUs☆2,348Updated 6 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆620Updated 4 years ago
- Interactive CTF Exploration Tool☆1,646Updated 3 years ago
- Reverse Engineering Page Table Caches in Your Processor☆366Updated 3 years ago
- Interactive shellcoding environment to easily craft shellcodes☆894Updated 3 years ago
- Some of my security stuff and vulnerabilities. Nothing advanced. More to come.☆866Updated 5 years ago
- A Pwn2Own exploit chain☆757Updated 6 years ago
- This repository contains several applications, demonstrating the Meltdown bug.☆4,123Updated 2 years ago
- The x86 processor fuzzer☆494Updated 6 years ago
- Inject a shared library (i.e. arbitrary code) into a live linux process, without ptrace☆775Updated this week
- Proof of Concepts (PE, PDF...)☆1,490Updated last month
- The code to the SGX-ROP paper☆183Updated 4 years ago
- A Javascript library for browser exploitation☆876Updated 5 years ago
- Intel Management Engine JTAG Proof of Concept☆513Updated 4 years ago
- Understand and mitigate software-observable side-channels☆500Updated 4 years ago
- ☆251Updated 4 years ago
- Meltdown Exploit PoC☆941Updated 6 years ago
- A realtime assembler/disassembler (formerly known as disasm.ninja)☆292Updated 2 years ago
- Tear the firmware apart with your bare hands;-)☆180Updated 3 years ago
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆1,836Updated last month
- SkySafe Miscellaneous Reverse Engineering Blog☆763Updated last year
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆497Updated last year
- Proof of concept code for the Spectre CPU exploit.☆303Updated 2 years ago
- Analysis of public exploits or my 1day exploits☆614Updated 4 years ago
- My proof-of-concept exploits for the Linux kernel☆1,461Updated 2 years ago
- Kernel Thread Sanitizer, a fast data race detector for the Linux kernel☆573Updated 3 years ago