LaurieWired / GhostWriteExploitLinks
Supporting code for exploiting the RISC-V GhostWrite vulnerability
☆71Updated 6 months ago
Alternatives and similar repositories for GhostWriteExploit
Users that are interested in GhostWriteExploit are comparing it to the libraries listed below
Sorting:
- Supporting code and apps for demonstrating Android interprocess communication☆41Updated 10 months ago
- ☆34Updated last year
- ☆109Updated 8 months ago
- C++ solution and demonstration of the Santa Claus concurrency problem☆62Updated 5 months ago
- Memory manipulation library for Linux.☆26Updated 3 weeks ago
- A simple header only SHA1 implementation in C (no dependencies)☆35Updated 3 months ago
- Binary Golf Grand Prix☆58Updated 2 months ago
- Turn binaries into music☆54Updated last year
- Rust hello world without stdlib (aarch64 linux)☆48Updated 2 months ago
- A collection of interesting ELF files for inspiration and testing☆28Updated 2 years ago
- Repository of algorithms implemented in pure assembly☆242Updated 11 months ago
- Minimalist Web Server for Linux written in x64 Assembly☆58Updated last year
- DOOM Open Source Release☆28Updated 8 years ago
- Something with wine. I always wanted to try that out, but never had the time. Now I do.☆21Updated last year
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
- 8-bit RISC CPU for Excel, and related files☆131Updated 6 months ago
- ☆21Updated last year
- simple client-side in-browser binary analysis and hex dump☆73Updated 4 months ago
- ☆165Updated 3 months ago
- Repo for the UEFI Development Series☆58Updated 2 weeks ago
- PDP-11 Related Source Code☆90Updated 3 months ago
- ☆167Updated 3 months ago
- Rust that is actually Fun☆204Updated 3 weeks ago
- Compiling C to FlipJump☆90Updated 4 months ago
- uwu☆21Updated 9 months ago
- Optimized parallel training implementation of a neural network in C for recognizing handwritten digits from scratch on the MNIST dataset☆85Updated 9 months ago
- Simple Experiment with Subframe rendering☆42Updated last year
- An exploit for Faronics DeepFreeze 8.38.220.5256 that uses SEH overflow, a custom ROP chain, and a two-phase encryption bypass to achieve…☆17Updated 5 months ago
- WMI virus, because funny☆281Updated 4 months ago
- ☆33Updated 2 years ago