bitdefender / lvi-lfb-attack-poc
This repository contains the sources and documentation for the LVI-LFB Control Flow Hijacking attack PoC (CVE-2020-0551)
☆25Updated 5 years ago
Alternatives and similar repositories for lvi-lfb-attack-poc:
Users that are interested in lvi-lfb-attack-poc are comparing it to the libraries listed below
- Working Set Page Cache side-channel IPC PoC☆66Updated 6 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- Using LibVMI to detect malware☆31Updated 2 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Updated 7 years ago
- python and honggfuzz☆25Updated 4 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆74Updated 5 years ago
- Code for my blog post on using S2E for malware analysis☆25Updated 5 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago
- Simulate afl-fuzz☆16Updated 5 years ago
- Python based angr plug in for IDA Pro.☆34Updated 7 years ago
- run AFL with pintool☆65Updated 5 years ago
- ☆44Updated 7 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- PoC for the taint-based ROP approach☆13Updated last year
- Security Evaluation of Dynamic Binary Instrumentation Engines☆79Updated 6 years ago
- ☆35Updated 3 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆41Updated 5 years ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Updated 5 years ago
- This repository contains the sources and documentation for the SWAPGS attack PoC (CVE-2019-1125)☆41Updated 5 years ago
- The Binary Mutation code based on Uroboros☆14Updated 6 years ago
- kMVX: Detecting Kernel Information Leaks with Multi-variant Execution☆21Updated 5 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Updated 6 years ago
- ARG: Automatic ROP chains Generation☆22Updated 5 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 6 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 5 years ago
- Miscellanous scripts used for malware analysis☆22Updated 6 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆111Updated 6 years ago
- A quick PoC to try out the "meltdown" timing attack.☆154Updated 7 years ago