asahilina / agx-exploitLinks
CVE-2022-32947 walkthough and demo
☆172Updated last year
Alternatives and similar repositories for agx-exploit
Users that are interested in agx-exploit are comparing it to the libraries listed below
Sorting:
- playing with DDR DRAM bus fault injection☆91Updated 7 months ago
- Defeating Pointer Authentication on the Apple M1 with Hardware Attacks☆43Updated 2 years ago
- AArch64 fuzzer based on the Apple Silicon hypervisor☆195Updated last year
- Arbitrary Speculative Code Execution with Return Instructions☆162Updated last year
- libLISA: Instruction Discovery and Analysis on x86-64☆113Updated 3 months ago
- simple type recognition in decompiled executables☆110Updated 11 months ago
- Reverse-engineering the Apple Video Decoder (AVD)☆147Updated last year
- Better Apple binary analysis for Ghidra☆119Updated this week
- TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution (IEEE S&P 2025)☆74Updated 6 months ago
- A library to assist writing memory-unsafe code in "pure" python, without any imports (i.e. no ctypes etc.)☆223Updated 4 months ago
- Radamsa fuzzer ported to rust lang☆153Updated 2 months ago
- LLEF is a plugin for LLDB to make it more useful for RE and VR☆401Updated 2 months ago
- Access Arm64 CPU system registers☆89Updated 2 weeks ago
- XZ backdoor reverse engineering☆95Updated 10 months ago
- Ariadne: Binary Ninja Graph Analysis Plugin☆92Updated 3 months ago
- Safari 1day RCE Exploit☆140Updated 2 months ago
- An educational Bochs-based snapshot fuzzer project☆181Updated last week
- A custom ELF linker/loader for installing ET_REL binary patches at runtime☆166Updated 2 months ago
- ☆144Updated 2 years ago
- An IOKit kext designed for microarchitectural security research on M1☆43Updated 2 years ago
- VirtFuzz is a Linux Kernel Fuzzer that uses VirtIO to provide inputs into the kernels subsystem. It is built with LibAFL.☆122Updated 11 months ago
- Proof-of-concept for the GhostWrite CPU bug.☆113Updated 9 months ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆60Updated 7 months ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆102Updated 3 months ago
- A multi-arch assembly REPL and emulator for your command line.☆311Updated 5 months ago
- A stealthy ELF loader - no files, no execve, no RWX☆165Updated last year
- XNU kernel, Kernel Collection and CodeQL build scripts☆234Updated 2 weeks ago
- The Decompilation Wiki: info on all things decompilation☆206Updated 2 weeks ago
- A tool to explore USB-C on Apple devices using the Tamarin C Hardware.☆208Updated last year
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,351Updated 4 months ago