LaurieWired / GhostWriteExploitLinks
Supporting code for exploiting the RISC-V GhostWrite vulnerability
☆81Updated last year
Alternatives and similar repositories for GhostWriteExploit
Users that are interested in GhostWriteExploit are comparing it to the libraries listed below
Sorting:
- Supporting code and apps for demonstrating Android interprocess communication☆42Updated last year
- ☆37Updated 2 years ago
- ☆112Updated last year
- Binary Golf Grand Prix☆84Updated last month
- Repository of algorithms implemented in pure assembly☆283Updated last year
- Get rickrolled, right in your favourite NSA reverse engineering tool☆75Updated 2 years ago
- A portable assembler for Z80, 8080, Gameboy, 6805, 8051 and others.☆45Updated 2 months ago
- Damn Vulnerable UEFI☆298Updated last year
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆175Updated 6 months ago
- ☆54Updated 9 months ago
- An emulation based tool for learning and debugging assembly.☆578Updated this week
- curiosity got me here☆45Updated last year
- Binary Golf Grand Prix☆116Updated 2 years ago
- 🍞 BREAD: BIOS Reverse Engineering & Advanced Debugger☆321Updated 3 months ago
- ☆52Updated last year
- yxd - Yuu's heX Dumper☆92Updated last year
- A tool to explore USB-C on Apple devices using the Tamarin C Hardware.☆224Updated 2 years ago
- My attempt to teach others about microprocessors and programming in IA-32 and IA-64 assembly, and to spread the word of how awesome it is…☆28Updated 3 years ago
- simple client-side in-browser binary analysis and hex dump☆90Updated last year
- XZ backdoor reverse engineering☆99Updated last year
- An exploit for Faronics DeepFreeze 8.38.220.5256 that uses SEH overflow, a custom ROP chain, and a two-phase encryption bypass to achieve…☆20Updated last year
- Turn binaries into music☆61Updated last year
- Minimal setup to trigger the xz backdoor☆29Updated last year
- A collection of interesting ELF files for inspiration and testing☆31Updated 3 years ago
- CVE-2022-32947 walkthough and demo☆186Updated 2 years ago
- This contains notes and slides for my talk on Reverse Engineering Android Malware☆59Updated 2 weeks ago
- Binary Golf Examples and Resources☆258Updated 3 months ago
- C++ solution and demonstration of the Santa Claus concurrency problem☆75Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆121Updated last year
- Modern Reverse Engineering books and resources☆94Updated last year