asm / deep_spectreLinks
Deep learning side channel privileged memory reader
☆45Updated 7 years ago
Alternatives and similar repositories for deep_spectre
Users that are interested in deep_spectre are comparing it to the libraries listed below
Sorting:
- A quick PoC to try out the "meltdown" timing attack.☆153Updated 8 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆77Updated 6 years ago
- Simulate afl-fuzz☆16Updated 6 years ago
- exploit development☆49Updated 7 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆114Updated 7 years ago
- A generated corpus, seed, and target for a fuzz job☆60Updated 9 years ago
- Proof of Concept of TrustZone exploit☆16Updated 5 months ago
- ☆50Updated 8 years ago
- Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow☆55Updated 9 years ago
- ☆49Updated 7 years ago
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13Updated 6 years ago
- Repo for CSAW CTF 2018 Finals challenges☆55Updated 7 years ago
- ☆13Updated 6 years ago
- ☆23Updated 6 years ago
- run AFL with pintool☆66Updated 5 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated last year
- Peach Pit for HTTP/2 Targeting Microsoft Edge☆63Updated 9 years ago
- ☆100Updated 7 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆57Updated 7 years ago
- ☆91Updated 9 years ago
- The Cisco IOS Debugger and Integrated Disassembler Environment☆79Updated 7 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Updated 7 years ago
- ARG: Automatic ROP chains Generation☆21Updated 6 years ago
- Tools released in CSS 2019☆38Updated 6 years ago
- Write ups of solution for CTF challenges I solved☆25Updated 4 years ago
- ☆15Updated 7 years ago
- Black Hat 2016 Slides, Paper and Code☆83Updated 9 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 8 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆37Updated 9 years ago