asahilina / agx-exploitLinks
CVE-2022-32947 walkthough and demo
☆174Updated last year
Alternatives and similar repositories for agx-exploit
Users that are interested in agx-exploit are comparing it to the libraries listed below
Sorting:
- playing with DDR DRAM bus fault injection☆92Updated 9 months ago
- An IOKit kext designed for microarchitectural security research on M1☆43Updated 2 years ago
- Defeating Pointer Authentication on the Apple M1 with Hardware Attacks☆43Updated 2 years ago
- XNU kernel, Kernel Collection and CodeQL build scripts☆241Updated 2 months ago
- Safari 1day RCE Exploit☆142Updated 4 months ago
- AArch64 fuzzer based on the Apple Silicon hypervisor☆198Updated last year
- Collection of materials relating to FORCEDENTRY☆99Updated last year
- The Decompilation Wiki: info on all things decompilation☆213Updated 2 weeks ago
- 🌐🐧 Browsable Linux kernel syscall tables built with Systrack (https://github.com/mebeim/systrack)☆191Updated 3 months ago
- Access Arm64 CPU system registers☆97Updated 2 months ago
- Better Apple binary analysis for Ghidra☆132Updated last week
- LLEF is a plugin for LLDB to make it more useful for RE and VR☆413Updated 3 weeks ago
- A GDB+GEF-style debugger for unloading Python pickles☆67Updated last month
- 📡🐧 Linux kernel syscall implementation tracker☆217Updated 4 months ago
- simple type recognition in decompiled executables☆113Updated last year
- Ariadne: Binary Ninja Graph Analysis Plugin☆93Updated 5 months ago
- Adding a little tay to IDA☆46Updated last year
- TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution (IEEE S&P 2025)☆78Updated 8 months ago
- XZ backdoor reverse engineering☆98Updated last year
- ☆20Updated 2 years ago
- ☆122Updated last year
- A study of V8 internals.☆65Updated 4 years ago
- Materials from the DEF CON 30 talk on PACMAN☆33Updated 2 years ago
- ☆316Updated last year
- Official Solution and Source Code for the "Mock Kernel" challenge from UIUCTF 2023☆49Updated 2 years ago
- Use-After-Free in Netfilter nf_tables when processing batch requests CVE-2023-32233☆51Updated 2 years ago
- Spectre based on Linear Address Masking☆69Updated last year
- Proof-of-concept for the GhostWrite CPU bug.☆115Updated last year
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆482Updated 2 years ago
- CVE-2025-31200 - @Noahhw46 figured it out☆98Updated 2 months ago