SideChannelMarvels / BlueGalaxyEnergyLinks
A tool to perform so called BGE attack
☆26Updated 7 months ago
Alternatives and similar repositories for BlueGalaxyEnergy
Users that are interested in BlueGalaxyEnergy are comparing it to the libraries listed below
Sorting:
- weggli ruleset scanner for source code and binaries☆35Updated 2 months ago
- Python interface for Binexport, the Bindiff export format☆19Updated last month
- Ghidra analyzer for UEFI firmware.☆18Updated 2 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 3 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- ☆26Updated last year
- TrustZone Trusted Application 0-Days by Design☆25Updated 8 months ago
- Diaphora Machine Learning tools and datasets☆23Updated last year
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆34Updated 11 months ago
- Binary exploitation by confusing the unwinder☆67Updated 2 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Updated 4 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆30Updated 2 years ago
- Python bindings for BochsCPU☆37Updated 5 months ago
- WTF Snapshot fuzzing of macOS targets☆99Updated last year
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Updated 5 years ago
- ☆55Updated 3 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 3 years ago
- Uncovering Container Confusion in the Linux Kernel☆45Updated last year
- ☆32Updated 2 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆65Updated 3 years ago
- ☆80Updated 3 years ago
- ☆67Updated 5 months ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆81Updated 2 months ago
- Breaking Secure Boot with SMM☆41Updated 3 years ago
- Xyntia, the black-box deobfuscator☆84Updated last month
- ☆50Updated 3 years ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 3 years ago
- Integer overflow in FreeType software, which also affects Chrome☆22Updated 4 months ago
- PANDA-powered tracing engine for tenet☆11Updated 3 years ago