SideChannelMarvels / BlueGalaxyEnergyLinks
A tool to perform so called BGE attack
☆24Updated last week
Alternatives and similar repositories for BlueGalaxyEnergy
Users that are interested in BlueGalaxyEnergy are comparing it to the libraries listed below
Sorting:
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Python interface for Binexport, the Bindiff export format☆17Updated last week
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- Ghidra analyzer for UEFI firmware.☆19Updated last year
- weggli ruleset scanner for source code and binaries☆29Updated 3 weeks ago
- ☆18Updated 3 years ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆33Updated 4 months ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- ☆21Updated last year
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆50Updated 4 years ago
- TrustZone Trusted Application 0-Days by Design☆21Updated last month
- Tool to extract the kallsyms (System.map) from a memory dump☆27Updated last year
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 3 years ago
- Vulnerability research assistant that extracts pseudo-code from the IDA Hex-Rays decompiler.☆44Updated last week
- Python bindings for BochsCPU☆36Updated 3 weeks ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆29Updated 2 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- Use Ghidra Structs in Python☆29Updated 4 years ago
- ☆43Updated last month
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆47Updated 3 weeks ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 5 years ago
- An AFL scaling benchmarking tool☆18Updated 5 years ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆41Updated 3 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- plugin for storing and using snippets of useful Binja script☆24Updated 9 months ago
- The rev.ng demos☆10Updated 7 months ago
- Ghidra P-Code emulation and static LLVM lifting in Python☆31Updated 3 years ago