bbbrumley / portsmashView external linksLinks
☆473Nov 20, 2024Updated last year
Alternatives and similar repositories for portsmash
Users that are interested in portsmash are comparing it to the libraries listed below
Sorting:
- The code to the SGX-ROP paper☆185Apr 4, 2020Updated 5 years ago
- VirtualBox E1000 Guest-to-Host Escape☆1,422Nov 15, 2018Updated 7 years ago
- ☆74Dec 27, 2017Updated 8 years ago
- Intel Management Engine JTAG Proof of Concept☆536Jun 12, 2020Updated 5 years ago
- Hardware backdoors in some x86 CPUs☆2,383Oct 12, 2018Updated 7 years ago
- Differential fuzzing for elliptic curves☆24Sep 6, 2023Updated 2 years ago
- POC for CVE-2018-4327☆42Sep 13, 2018Updated 7 years ago
- RIDL test suite and exploits☆366Jun 9, 2020Updated 5 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆77Nov 12, 2019Updated 6 years ago
- Some kernel exploits☆146Nov 7, 2017Updated 8 years ago
- Reverse Engineering Page Table Caches in Your Processor☆373May 5, 2021Updated 4 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Oct 26, 2025Updated 3 months ago
- Windows device tree walker☆15Sep 19, 2018Updated 7 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆217Feb 2, 2018Updated 8 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆118Aug 8, 2018Updated 7 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆120Nov 6, 2024Updated last year
- The x86 processor fuzzer☆5,004Feb 20, 2024Updated last year
- 基于WinDivert实现的一个包过滤与截断程序☆13Jul 22, 2018Updated 7 years ago
- A practical attack framework for precise enclave execution control☆471Jan 16, 2026Updated 3 weeks ago
- Small tool for generating ropchains using unicorn and z3☆198Feb 22, 2018Updated 7 years ago
- VirtualBox 3D exploits & PoCs☆162Jan 24, 2019Updated 7 years ago
- Code to evaluate XLATE attacks as well existing cache attacks.☆31Aug 17, 2018Updated 7 years ago
- Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode☆355Oct 21, 2018Updated 7 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS).☆79May 10, 2018Updated 7 years ago
- Proof-of-concept for the ZombieLoad attack☆826Dec 24, 2021Updated 4 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆310Feb 24, 2019Updated 6 years ago
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆36Feb 28, 2020Updated 5 years ago
- PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.☆152Jun 3, 2019Updated 6 years ago
- syzkaller is an unsupervised coverage-guided kernel fuzzer☆6,048Updated this week
- A stateful fuzzing engine.☆45Nov 14, 2018Updated 7 years ago
- Platform Security Assessment Framework☆3,181Updated this week
- This repository contains examples of Flush+Flush cache attacks☆169Oct 12, 2021Updated 4 years ago
- This repo has been migrated to https://github.com/github/security-lab/tree/master/SecurityExploits☆252Nov 5, 2019Updated 6 years ago
- A Pwn2Own exploit chain☆757Nov 8, 2018Updated 7 years ago
- POC and exploitation of vulnerabilities☆91Mar 22, 2022Updated 3 years ago
- A tool for checking exploitability☆210May 31, 2019Updated 6 years ago
- TrueType and OpenType font fuzzing toolset☆437Aug 28, 2019Updated 6 years ago
- Elliptic curves Rust reference implementation☆16Mar 10, 2024Updated last year
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆164Mar 15, 2018Updated 7 years ago