SideChannelMarvels / BlueGalaxyEnergy
A tool to perform so called BGE attack
☆24Updated 11 months ago
Alternatives and similar repositories for BlueGalaxyEnergy:
Users that are interested in BlueGalaxyEnergy are comparing it to the libraries listed below
- Python interface for Binexport, the Bindiff export format☆14Updated 3 weeks ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- weggli ruleset scanner for source code and binaries☆25Updated 2 months ago
- Ghidra analyzer for UEFI firmware.☆15Updated last year
- TrustZone Trusted Application 0-Days by Design☆18Updated 4 months ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆44Updated 2 months ago
- ☆21Updated last year
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago
- A cross-platform plugin for Ghidra that provides deep linking support. This enables the generation of clickable disas:// links that can b…☆35Updated last week
- An AFL scaling benchmarking tool☆18Updated 4 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 2 years ago
- ☆18Updated 3 years ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆26Updated last month
- Diaphora Machine Learning tools and datasets☆19Updated 5 months ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆49Updated 4 years ago
- Sample Binary Ninja Plugin☆21Updated last year
- Breaking Secure Boot with SMM☆40Updated 2 years ago
- Automated recovery of Linux kernel build configurations☆24Updated 3 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- Linux Kernel Snapshot Fuzzer using KVM☆46Updated last year
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- A MBR Fuzzer☆28Updated 11 months ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆27Updated 2 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 5 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated last year
- Binary exploitation by confusing the unwinder☆59Updated 2 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆30Updated 4 years ago