SideChannelMarvels / BlueGalaxyEnergyLinks
A tool to perform so called BGE attack
☆25Updated 2 months ago
Alternatives and similar repositories for BlueGalaxyEnergy
Users that are interested in BlueGalaxyEnergy are comparing it to the libraries listed below
Sorting:
- Ghidra analyzer for UEFI firmware.☆18Updated 2 years ago
- Python interface for Binexport, the Bindiff export format☆17Updated last week
- weggli ruleset scanner for source code and binaries☆29Updated 3 months ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 2 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- Python bindings for BochsCPU☆37Updated 2 weeks ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆33Updated 6 months ago
- Binary exploitation by confusing the unwinder☆63Updated 2 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- r2con 2020 CTF kernel challenge☆12Updated 4 years ago
- ☆21Updated last year
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆78Updated 2 months ago
- PANDA-powered tracing engine for tenet☆11Updated 3 years ago
- TrustZone Trusted Application 0-Days by Design☆22Updated 3 months ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- ☆50Updated last month
- Uncovering Container Confusion in the Linux Kernel☆44Updated last year
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- ☆57Updated 2 years ago
- Xyntia, the black-box deobfuscator☆74Updated 2 months ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆28Updated 3 years ago
- ☆14Updated 2 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- Interface GDB-GEF with Binary Ninja☆58Updated 4 years ago
- ☆18Updated 3 years ago
- ☆82Updated 2 years ago
- This tool calculates tricky canonical huffman histogram for CVE-2023-4863.☆27Updated last year