RischardV / riscv-alphanumeric-shellcodingLinks
Alphanumeric+1 shellcoding tools for RISC-V
☆36Updated 5 years ago
Alternatives and similar repositories for riscv-alphanumeric-shellcoding
Users that are interested in riscv-alphanumeric-shellcoding are comparing it to the libraries listed below
Sorting:
- Working Set Page Cache side-channel IPC PoC☆68Updated 6 years ago
- ☆36Updated 4 years ago
- An AFL scaling benchmarking tool☆18Updated 5 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 6 years ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 3 years ago
- This is the source of our Return Oriented Programming tool.☆15Updated 5 years ago
- Ditto.☆18Updated 4 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- Simulate afl-fuzz☆16Updated 5 years ago
- Python interface for Binexport, the Bindiff export format☆17Updated last month
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- A tool to interactively explore the heap of a python process☆25Updated 4 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- ☆23Updated 4 years ago
- A quick PoC to try out the "meltdown" timing attack.☆155Updated 7 years ago
- ☆18Updated 3 years ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆47Updated last month
- Proof-of-concept code for the SMoTherSpectre exploit.☆75Updated 5 years ago
- Virtual machine introspection library based on libvmi - parts of this work have been funded by Deutsche Forschungsgemeinschaft (DFG) – pr…☆29Updated 3 years ago
- This repository contains the sources and documentation for the LVI-LFB Control Flow Hijacking attack PoC (CVE-2020-0551)☆25Updated 5 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 5 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 6 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆55Updated 5 years ago
- QEmu backend for avatar²☆21Updated 3 months ago
- ☆48Updated 2 years ago
- A tool to perform so called BGE attack☆24Updated last month
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆30Updated 7 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆129Updated 7 years ago
- Here's the slides and audio for a talk I did at NYU on the 13th of November 2018☆27Updated 6 years ago