RischardV / riscv-alphanumeric-shellcoding
Alphanumeric+1 shellcoding tools for RISC-V
☆36Updated 5 years ago
Alternatives and similar repositories for riscv-alphanumeric-shellcoding:
Users that are interested in riscv-alphanumeric-shellcoding are comparing it to the libraries listed below
- QEmu backend for avatar²☆21Updated 4 months ago
- ☆35Updated 3 years ago
- This is the source of our Return Oriented Programming tool.☆15Updated 5 years ago
- Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks☆36Updated 4 years ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 2 years ago
- tool for multi-execution jump coverage introspection☆63Updated last month
- A quick PoC to try out the "meltdown" timing attack.☆154Updated 7 years ago
- An AFL scaling benchmarking tool☆18Updated 4 years ago
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆41Updated 6 years ago
- Working Set Page Cache side-channel IPC PoC☆66Updated 6 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- SymFusion: Hybrid Instrumentation for Concolic Execution☆17Updated last year
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆19Updated 5 years ago
- A GUI fuzzing application set up to fuzz calc.exe right now☆36Updated 4 years ago
- Repo for fuzzing projects☆46Updated 4 years ago
- ☆18Updated 3 years ago
- Tools released in CSS 2019☆38Updated 5 years ago
- Linux kernel branches for confidential compute research☆17Updated last month
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 5 years ago
- Proof of Concept of TrustZone exploit☆16Updated 5 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆25Updated last year
- This repository contains the sources and documentation for the LVI-LFB Control Flow Hijacking attack PoC (CVE-2020-0551)☆25Updated 5 years ago
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆33Updated 5 years ago
- A tool to perform so called BGE attack☆24Updated 11 months ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆20Updated 5 years ago
- Tools built using Dyninst or Dyninst component libraries.☆25Updated 2 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆74Updated 5 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Updated 7 years ago