airbus-seclab / crashosLinks
A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.
☆185Updated 3 years ago
Alternatives and similar repositories for crashos
Users that are interested in crashos are comparing it to the libraries listed below
Sorting:
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆166Updated 8 years ago
- Notes on various topics I'm interested in☆160Updated 10 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 9 years ago
- High-throughput fuzzer and emulator of DECREE binaries☆242Updated 6 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆287Updated 9 years ago
- Slides and very basic examples☆112Updated 8 years ago
- ☆172Updated 3 years ago
- A program to draw rectangles from heap traces.☆135Updated 5 years ago
- An open source, multi-architecture ROP compiler written in python☆162Updated 8 years ago
- GrSecurity and PaX Patches Before End of Public Release☆64Updated 7 years ago
- Small tool for generating ropchains using unicorn and z3☆198Updated 7 years ago
- ☆164Updated 8 years ago
- capstone based disassembler for extracting to binnavi☆228Updated 9 years ago
- Conference slides and White-papers☆358Updated 5 years ago
- Synesthesia, implemented as Yices scripts☆94Updated 8 years ago
- add symbols back into a stripped ELF binary (~strip)☆175Updated 8 years ago
- Hypervisor-Level Debugger based on Radare2 / LibVMI, using VMI IO and debug plugins☆134Updated 6 years ago
- ☆105Updated 10 years ago
- Scripts for Binary Ninja☆257Updated 2 years ago
- Semantic Binary Code Analysis Framework☆124Updated 9 years ago
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆123Updated 8 years ago
- ☆76Updated last year
- Routines for hunting down kernel symbols.☆82Updated 14 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆163Updated 3 weeks ago
- Implementation of the SMM rootkit "The Watcher"☆128Updated 3 years ago
- grap: define and match graph patterns within binaries☆171Updated 4 years ago
- The DrK Attack - Proof of concept☆347Updated 3 years ago
- A program that automatically generates AFL-enabled builds of Debian packages.☆92Updated 5 years ago
- Implementations of program analysis tools with a focus on machine code☆208Updated 10 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for x86 (Presented at BlackHat Asia 2017/2018, beVX 2018 and HITBSecConf 2017)☆187Updated 6 years ago