LaurieWired / GhostWriteExploitLinks
Supporting code for exploiting the RISC-V GhostWrite vulnerability
☆77Updated 9 months ago
Alternatives and similar repositories for GhostWriteExploit
Users that are interested in GhostWriteExploit are comparing it to the libraries listed below
Sorting:
- Supporting code and apps for demonstrating Android interprocess communication☆39Updated last year
- ☆110Updated 10 months ago
- ☆35Updated last year
- Repository of algorithms implemented in pure assembly☆250Updated last year
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
- Turn binaries into music☆50Updated last year
- simple client-side in-browser binary analysis and hex dump☆88Updated 7 months ago
- An emulation based tool for learning and debugging assembly.☆560Updated 3 months ago
- An exploit for Faronics DeepFreeze 8.38.220.5256 that uses SEH overflow, a custom ROP chain, and a two-phase encryption bypass to achieve…☆19Updated 8 months ago
- WMI virus, because funny☆293Updated 7 months ago
- The ARTful library for dynamically modifying the Android Runtime☆338Updated last year
- Automated Android custom unpacker generator☆342Updated this week
- A tool to explore USB-C on Apple devices using the Tamarin C Hardware.☆217Updated last year
- Binary Golf Examples and Resources☆256Updated last year
- Minimalist Web Server for Linux written in x64 Assembly☆60Updated last year
- Web based binary analysis☆85Updated 9 months ago
- ☆178Updated 6 months ago
- A Saleae Analyzer for TPM traffic that only requires the LADD & LFRAME signals, no clock.☆140Updated last year
- Docker container for quickly analyzing Linux malware☆77Updated 2 years ago
- Binary Golf Grand Prix☆61Updated 5 months ago
- playing with DDR DRAM bus fault injection☆92Updated 10 months ago
- 🍞 BREAD: BIOS Reverse Engineering & Advanced Debugger☆313Updated last year
- ☆51Updated last year
- PDP-11 Related Source Code☆102Updated last month
- Reverse engineering the TI AM3358 boot ROM☆53Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆122Updated 8 months ago
- Damn Vulnerable UEFI☆287Updated 11 months ago
- 8-bit RISC CPU for Excel, and related files☆139Updated 9 months ago
- This contains notes and slides for my talk on Reverse Engineering Android Malware☆53Updated last year
- ☆52Updated 4 months ago