Supporting code for exploiting the RISC-V GhostWrite vulnerability
☆84Nov 22, 2024Updated last year
Alternatives and similar repositories for GhostWriteExploit
Users that are interested in GhostWriteExploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Apr 1, 2025Updated 11 months ago
- ☆38Oct 24, 2023Updated 2 years ago
- This contains notes, slides, and code for my Infosec World talk☆18Sep 26, 2023Updated 2 years ago
- This repo contains the APK to follow along with my "Beautifying Android Native Code" Video on Youtube☆13May 31, 2023Updated 2 years ago
- This contains notes and slides for my talk on Reverse Engineering Android Malware☆64Feb 6, 2026Updated last month
- Smali reference for reverse engineering Dalvik Bytecode☆41Sep 6, 2023Updated 2 years ago
- This contains notes and code for my Troopers23 Beyond Java talk☆24Jun 30, 2023Updated 2 years ago
- Turn binaries into music☆65May 17, 2024Updated last year
- Notes for my video on running an ARM64 Android emulator in Azure☆40Jul 19, 2024Updated last year
- A guide to choosing between different Android Emulator options for Reverse Engineers☆124Feb 7, 2023Updated 3 years ago
- xv6 ported to x86_64.☆10Jan 9, 2021Updated 5 years ago
- Docker container for quickly analyzing Linux malware☆86Aug 20, 2023Updated 2 years ago
- Repository of algorithms implemented in pure assembly☆289Jun 12, 2024Updated last year
- JADX-gui scripting plugin for dynamic decompiler manipulation☆722Feb 5, 2024Updated 2 years ago
- a tool that collects and reports heap allocated memory☆13Oct 5, 2025Updated 5 months ago
- Run the Medusa Android framework inside a docker container on x86 or ARM☆41Mar 19, 2023Updated 3 years ago
- ☆12Jan 13, 2025Updated last year
- ☆12Aug 10, 2021Updated 4 years ago
- Small management app for home router based on Raspberry Pi☆17Jan 3, 2016Updated 10 years ago
- Материалы к серии докладов о советской компиляторной школе☆12Aug 8, 2024Updated last year
- ☆38Mar 7, 2026Updated 2 weeks ago
- Read-only mirror for Trusted Firmware-M☆41Updated this week
- A 64bit-TinyRAM simulator in Go☆13Oct 18, 2018Updated 7 years ago
- A simple distributed document database backed by Sled Key/Value store☆30Oct 14, 2021Updated 4 years ago
- public-domain base64 implementation☆16Nov 18, 2021Updated 4 years ago
- A gopher daemon☆12May 16, 2022Updated 3 years ago
- Binary "disassembler" interpreting as raster scan-lines and pixel maps☆12Aug 6, 2018Updated 7 years ago
- A pure Rust implementation of AES 128☆18Mar 24, 2020Updated 6 years ago
- The iOS IPA file Reverse Engineering reference☆509Jan 29, 2024Updated 2 years ago
- My solutions for pwn and reversing challenges☆11Mar 18, 2018Updated 8 years ago
- 🧙♀️ ᚱᚢᚾᛖᛋ in your R Documents!☆11Dec 13, 2020Updated 5 years ago
- AN EXPERIMENTAL INDIE 1D ROGUELIKE. YOU ARE DEAD☆73Apr 2, 2013Updated 12 years ago
- Simple math functions in (mostly) python☆11Oct 6, 2022Updated 3 years ago
- DJI Drone Control Hijacking☆44Sep 13, 2023Updated 2 years ago
- Offensive cybersecurity toolkit for vulnerability analysis and penetration testing of OBD-II devices.☆29Sep 23, 2025Updated 6 months ago
- A collection of my public security advisories.☆28Nov 10, 2025Updated 4 months ago
- 🍞 | IDE focused programming language study☆39Mar 4, 2024Updated 2 years ago
- Reference DHCP client in go☆10Jul 1, 2024Updated last year
- A curated list of browser fuzzing researches, papers, tools, ...☆14Jan 30, 2023Updated 3 years ago