SideChannelMarvels / BlueGalaxyEnergy
A tool to perform so called BGE attack
☆22Updated 10 months ago
Alternatives and similar repositories for BlueGalaxyEnergy:
Users that are interested in BlueGalaxyEnergy are comparing it to the libraries listed below
- Python interface for Binexport, the Bindiff export format☆14Updated 7 months ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- Ghidra analyzer for UEFI firmware.☆15Updated last year
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆26Updated last week
- ☆18Updated 3 years ago
- Sample Binary Ninja Plugin☆20Updated last year
- Python bindings for BochsCPU☆35Updated 4 months ago
- Automated recovery of Linux kernel build configurations☆24Updated 3 years ago
- IDA (sort of) headless☆22Updated 11 months ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆30Updated 4 years ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 2 years ago
- An AFL scaling benchmarking tool☆18Updated 4 years ago
- TrustZone Trusted Application 0-Days by Design☆18Updated 3 months ago
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆27Updated last year
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- ☆21Updated last year
- weggli ruleset scanner for source code and binaries☆23Updated last month
- A cross-platform plugin for Ghidra that provides deep linking support. This enables the generation of clickable disas:// links that can b…☆33Updated 3 months ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆43Updated 3 weeks ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- Load function names from an IDA Pro database inside GDB☆20Updated 6 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- Linux Kernel Snapshot Fuzzer using KVM☆46Updated 11 months ago
- ☆14Updated 2 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆49Updated 4 years ago
- ☆27Updated last year
- Binary exploitation by confusing the unwinder☆59Updated last year
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆26Updated this week