RealJTG / Meltdown
Meltdown PoC for reading passwords from Google Chrome.
☆471Updated 7 years ago
Alternatives and similar repositories for Meltdown
Users that are interested in Meltdown are comparing it to the libraries listed below
Sorting:
- Certified Edible Dinosaurs official CTF toolkit☆121Updated 7 years ago
- A tool for checking exploitability☆210Updated 5 years ago
- Radare 2 wiki☆92Updated 5 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- ☆26Updated 7 years ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- ☆49Updated 7 years ago
- A Not So Very Intelligent Fuzzer: An advanced fuzzing framework designed to find vulnerabilities in C/C++ code.☆102Updated 4 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆129Updated 7 years ago
- Block-based software vulnerability fuzzing framework☆49Updated 6 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 6 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 7 years ago
- ☆89Updated 9 months ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆93Updated 3 years ago
- Fuzzing results for various interpreters.☆80Updated 7 years ago
- Some kernel exploits☆144Updated 7 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆72Updated 8 years ago
- ☆22Updated 8 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Updated 8 years ago
- 🏴 Collection of CTF solutions☆75Updated 6 years ago
- Collection of software bugs found by SkyLined☆68Updated 8 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆83Updated 6 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- Writeups for PicoCTF2017 Challenges☆10Updated 8 years ago
- Training Materials of Practical Reverse Engineering using Radare2☆107Updated 8 years ago
- Repo for CSAW CTF 2018 Finals challenges☆56Updated 6 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- ☆87Updated 8 years ago