asm / deep_spectreLinks
Deep learning side channel privileged memory reader
☆45Updated 7 years ago
Alternatives and similar repositories for deep_spectre
Users that are interested in deep_spectre are comparing it to the libraries listed below
Sorting:
- Simulate afl-fuzz☆16Updated 6 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆76Updated 6 years ago
- A quick PoC to try out the "meltdown" timing attack.☆153Updated 7 years ago
- ☆50Updated 8 years ago
- ☆49Updated 7 years ago
- Write ups☆16Updated 8 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆73Updated 8 years ago
- exploit development☆49Updated 7 years ago
- Fuzzing scripts for the American Fuzzy Lop (AFL) fuzzer☆48Updated 9 years ago
- Tool to view heap chunks and memory writes (using pintool)☆42Updated 7 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆82Updated 9 years ago
- Write ups of solution for CTF challenges I solved☆25Updated 4 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆56Updated 7 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆113Updated 7 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063) with CFG Bypass☆40Updated 8 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- A tool to add simple inline patches to a binary to rearrange its stack frames, and other things!☆46Updated 3 years ago
- z3 scripts and ctf challenge solutions.☆24Updated 3 years ago
- ☆23Updated 6 years ago
- run AFL with pintool☆66Updated 5 years ago
- ☆43Updated 7 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆90Updated 12 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 6 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Updated 7 years ago
- The Cisco IOS Debugger and Integrated Disassembler Environment☆79Updated 7 years ago
- Black Hat 2016 Slides, Paper and Code☆82Updated 9 years ago
- IDA cLEMENCy Tools☆63Updated 8 years ago
- ☆40Updated 7 years ago
- Peach Pit for HTTP/2 Targeting Microsoft Edge☆64Updated 8 years ago
- ☆100Updated 7 years ago