LaurieWired / GhostWriteExploit
Supporting code for exploiting the RISC-V GhostWrite vulnerability
☆68Updated 4 months ago
Alternatives and similar repositories for GhostWriteExploit:
Users that are interested in GhostWriteExploit are comparing it to the libraries listed below
- Supporting code and apps for demonstrating Android interprocess communication☆40Updated 7 months ago
- ☆110Updated 6 months ago
- ☆32Updated last year
- Minimalist Web Server for Linux written in x64 Assembly☆56Updated last year
- ☆155Updated last month
- Binary Golf Grand Prix☆53Updated 2 weeks ago
- Compiling C to FlipJump☆87Updated 2 months ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated last year
- Turn binaries into music☆52Updated 10 months ago
- uwu☆21Updated 7 months ago
- Solutions and writeups for the Flare-On 11 (2024) reverse engineering challenge☆63Updated 3 months ago
- A collection of interesting ELF files for inspiration and testing☆27Updated 2 years ago
- 8-bit RISC CPU for Excel, and related files☆121Updated 4 months ago
- curiosity got me here☆36Updated 8 months ago
- Optimized parallel training implementation of a neural network in C for recognizing handwritten digits from scratch on the MNIST dataset☆85Updated 7 months ago
- Automated Android custom unpacker generator☆317Updated 9 months ago
- Binary Golf Grand Prix☆111Updated last year
- CVE-2022-32947 walkthough and demo☆169Updated last year
- Web based binary analysis☆84Updated 4 months ago
- This contains notes and slides for my talk on Reverse Engineering Android Malware☆52Updated last year
- A simple header only SHA1 implementation in C (no dependencies)☆34Updated last month
- Minimal setup to trigger the xz backdoor☆26Updated 5 months ago
- ☆47Updated 10 months ago
- NES emulator written in C/C++ using pure WinAPI☆111Updated last month
- PoC for CVE-2024-48990☆98Updated 4 months ago
- Proof-of-concept for the GhostWrite CPU bug.☆106Updated 7 months ago
- simple client-side in-browser binary analysis and hex dump☆68Updated 2 months ago
- Defeating Pointer Authentication on the Apple M1 with Hardware Attacks☆40Updated 2 years ago
- PDP-11 Related Source Code☆89Updated 3 weeks ago
- 🧞♂️ malware analysis☆34Updated last year