PSU-Security-Universe / badassView external linksLinks
Demonstrating the BadAss issue.
☆17May 19, 2025Updated 8 months ago
Alternatives and similar repositories for badass
Users that are interested in badass are comparing it to the libraries listed below
Sorting:
- A Refcount-guided Fuzzer for Exposing Temporal Memory Errors in Linux Kernel☆30Jun 24, 2025Updated 7 months ago
- A tool for automatically identifying syscall-guard variables☆37Updated this week
- A list of data-only attacks☆21Aug 22, 2025Updated 5 months ago
- Proof-of-Concept of the Frontal Attack☆11Jul 6, 2023Updated 2 years ago
- Spectre variant 1 exploitation via PRIME+PROBE☆10May 22, 2019Updated 6 years ago
- Research Artifact for HPCA'24 Paper: *Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities*.☆11Oct 30, 2025Updated 3 months ago
- Proof-of-concept implementation for the paper "ThermalScope: A Practical Interrupt Side Channel Attack Based On Thermal Event Interrupts"…☆13Dec 17, 2024Updated last year
- Rust and C Benchmarks☆14Nov 21, 2024Updated last year
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆33Aug 30, 2023Updated 2 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Jan 27, 2025Updated last year
- Proof-of-concept implementation for the paper "SegScope: Probing Fine-grained Interrupts via Architectural Footprints" (HPCA'24)☆19Jan 26, 2026Updated 3 weeks ago
- ☆16Aug 4, 2023Updated 2 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆23Nov 12, 2019Updated 6 years ago
- FunSeeker: Binary Function Identification Tool☆26Dec 23, 2023Updated 2 years ago
- ☆35Feb 4, 2026Updated last week
- SUPA☆28Jan 15, 2026Updated last month
- A Secure and Memory-Efficient Heap Allocator☆34Jun 21, 2024Updated last year
- ☆29Jul 4, 2018Updated 7 years ago
- ☆24Nov 16, 2023Updated 2 years ago
- Dr. Disassembler☆37Jan 5, 2022Updated 4 years ago
- Vulnerability analysis and proof of concepts☆38May 15, 2023Updated 2 years ago
- Proof-of-concept implementation for the paper "A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs" (IEEE S&P 2023)☆80Nov 10, 2025Updated 3 months ago
- Artifact Repository for the paper "Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses"☆41Nov 13, 2021Updated 4 years ago
- ☆37May 19, 2023Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 2 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆37Feb 24, 2016Updated 9 years ago
- Tools for "Another Flip in the Wall"☆41Jun 12, 2018Updated 7 years ago
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆39Nov 26, 2024Updated last year
- A toy code generator (i.e. "program synthesis") using the Z3 solver☆35Nov 13, 2017Updated 8 years ago
- Formally verified x86-64 decompilation☆44Feb 2, 2026Updated 2 weeks ago
- ☆38Feb 15, 2022Updated 4 years ago
- light ifconfig☆14Apr 13, 2019Updated 6 years ago
- Root Repo for the EPOXY tool that applies Privilege Overlays on bare-metal systems☆32May 18, 2017Updated 8 years ago
- Signedness-Agnostic Strided-Interval☆38Jun 21, 2019Updated 6 years ago
- A toy LDAP server in C for illustrative purposes☆12Apr 6, 2011Updated 14 years ago
- ☆17Jan 1, 2021Updated 5 years ago
- WinDbg plugin to trace module transitions from a debugged driver.☆40Dec 22, 2025Updated last month
- VMSDK implements the Evidence API☆11Nov 25, 2024Updated last year
- Constraint solver based on abstract interpretation☆10Dec 20, 2024Updated last year