LaurieWired / GhostWriteExploitLinks
Supporting code for exploiting the RISC-V GhostWrite vulnerability
☆75Updated 7 months ago
Alternatives and similar repositories for GhostWriteExploit
Users that are interested in GhostWriteExploit are comparing it to the libraries listed below
Sorting:
- Supporting code and apps for demonstrating Android interprocess communication☆41Updated 10 months ago
- ☆35Updated last year
- Turn binaries into music☆50Updated last year
- An emulation based tool for learning and debugging assembly.☆546Updated last month
- C++ solution and demonstration of the Santa Claus concurrency problem☆63Updated 5 months ago
- Binary Golf Grand Prix☆60Updated 3 months ago
- ☆109Updated 8 months ago
- This contains notes and slides for my talk on Reverse Engineering Android Malware☆55Updated last year
- This contains notes, slides, and code for my Strange Loop talk☆32Updated last year
- ☆21Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆120Updated 6 months ago
- Tool for recovering the phone number tied to a Google account☆95Updated 3 weeks ago
- Automated Android custom unpacker generator☆335Updated 11 months ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
- This contains notes, slides, and code for my BsidesSeattle 2023 talk, Unmasking the Godfather☆15Updated 2 years ago
- simple client-side in-browser binary analysis and hex dump☆77Updated 5 months ago
- This contains notes, slides, and code for my Infosec World talk☆20Updated last year
- This contains notes and slides for my REcon 2024 talk on Auto Unpacking Android Malware☆30Updated 11 months ago
- WMI virus, because funny☆282Updated 4 months ago
- Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro☆74Updated 2 months ago
- .wav files of various oscilliscope graphics tests☆17Updated last year
- My attempt to teach others about microprocessors and programming in IA-32 and IA-64 assembly, and to spread the word of how awesome it is…☆29Updated 2 years ago
- An exploit for Faronics DeepFreeze 8.38.220.5256 that uses SEH overflow, a custom ROP chain, and a two-phase encryption bypass to achieve…☆17Updated 6 months ago
- VStarcam P2P Decryption Utility☆40Updated 10 months ago
- Smali reference for reverse engineering Dalvik Bytecode☆38Updated last year
- A comprehensive systems programming toolkit implementing low-level concepts in C, from memory management to OS internals. Features practi…☆64Updated 4 months ago
- A library for intercepting system calls☆96Updated 5 months ago
- Repository of algorithms implemented in pure assembly☆243Updated last year
- Optimized parallel training implementation of a neural network in C for recognizing handwritten digits from scratch on the MNIST dataset☆86Updated 10 months ago
- A collection of interesting ELF files for inspiration and testing☆29Updated 2 years ago