RischardV / riscv-alphanumeric-shellcoding
Alphanumeric+1 shellcoding tools for RISC-V
☆36Updated 5 years ago
Alternatives and similar repositories for riscv-alphanumeric-shellcoding:
Users that are interested in riscv-alphanumeric-shellcoding are comparing it to the libraries listed below
- Working Set Page Cache side-channel IPC PoC☆68Updated 6 years ago
- An AFL scaling benchmarking tool☆18Updated 4 years ago
- ☆35Updated 3 years ago
- QEmu backend for avatar²☆21Updated 2 weeks ago
- Simulate afl-fuzz☆16Updated 5 years ago
- Ditto.☆17Updated 4 years ago
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- Tools released in CSS 2019☆38Updated 5 years ago
- Bootloader research tools (very much a work in progress)☆37Updated 6 years ago
- ☆20Updated 5 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆41Updated 6 years ago
- A project for simulating fuzzing such that analysis can be done on coverage/feedback/scaling mechanisms☆9Updated 5 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆20Updated 5 years ago
- A tool to perform so called BGE attack☆24Updated last year
- This is the source of our Return Oriented Programming tool.☆15Updated 5 years ago
- Tasteless CTF 2019☆20Updated 5 years ago
- ARG: Automatic ROP chains Generation☆22Updated 5 years ago
- ☆17Updated 4 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Updated 7 years ago
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13Updated 5 years ago
- ☆16Updated 5 years ago
- Proof of Concept of TrustZone exploit☆16Updated 5 years ago
- Python based angr plug in for IDA Pro.☆34Updated 7 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆31Updated 6 years ago
- Here's the slides and audio for a talk I did at NYU on the 13th of November 2018☆27Updated 6 years ago
- A quick PoC to try out the "meltdown" timing attack.☆154Updated 7 years ago
- ☆12Updated 3 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 2 years ago