This repository contains the sources and documentation for the LVI-LFB Control Flow Hijacking attack PoC (CVE-2020-0551)
☆26Mar 10, 2020Updated 5 years ago
Alternatives and similar repositories for lvi-lfb-attack-poc
Users that are interested in lvi-lfb-attack-poc are comparing it to the libraries listed below
Sorting:
- Telegram-based PowerShell Runspace Host☆11Dec 8, 2022Updated 3 years ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆12Mar 4, 2021Updated 5 years ago
- ☆17Oct 5, 2020Updated 5 years ago
- The artifact for SecSMT paper -- Usenix Security 2022☆31Oct 4, 2022Updated 3 years ago
- Crashbench is a LLM benchmark to measure bug-finding and reporting capabilities of LLMs☆14Updated this week
- This repository contains the sources and documentation for the SWAPGS attack PoC (CVE-2019-1125)☆41Jan 27, 2020Updated 6 years ago
- A Wireshark dissector for Bluetooth Low Energy (BLE) advertisement packets of Apple Continuity, Microsoft CDP and Garmin proprietary prot…☆17Mar 13, 2020Updated 5 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆77Nov 12, 2019Updated 6 years ago
- Memory consistency model checking and test generation library.☆16Oct 14, 2016Updated 9 years ago
- Proof of concept exploit about OpenSSL signature_algorithms_cert DoS flaw (CVE-2020-1967)☆20Jun 16, 2024Updated last year
- My articles for Paged Out! #2☆17Nov 20, 2019Updated 6 years ago
- ☆24Aug 22, 2024Updated last year
- Control Flow Guard Teleportation demo☆23Jul 28, 2019Updated 6 years ago
- <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en" xml:lang="en" class=…☆10Jun 13, 2017Updated 8 years ago
- Proof of concept code for the Spectre CPU exploit.☆310Jan 28, 2023Updated 3 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- ☆29Jan 31, 2025Updated last year
- Verifiable Random Function☆30Jun 22, 2020Updated 5 years ago
- Dynamic binary translator for x86 binaries☆38Apr 7, 2023Updated 2 years ago
- Spectre based on Linear Address Masking☆68Dec 4, 2023Updated 2 years ago
- French old computer security ezines restored to serve as mirrors. The sources have been slightly tweaked for immediate use.☆72Oct 24, 2025Updated 4 months ago
- Stable, non-KVM version of PTLsim.☆29Feb 16, 2016Updated 10 years ago
- Open-source release of "Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud" (ASPLOS '24)☆33Feb 13, 2026Updated 3 weeks ago
- A design automation framework to engineer decision diagrams yourself☆25Updated this week
- Neutralize KEPServerEX anti-debugging techniques☆33Feb 15, 2023Updated 3 years ago
- HyperBench: A Benchmark Suite for Virtualization Capabilities☆32Nov 22, 2019Updated 6 years ago
- CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code☆37Sep 8, 2020Updated 5 years ago
- ☆135Dec 15, 2019Updated 6 years ago
- BadUSB ile Penetrasyon☆13Jun 15, 2019Updated 6 years ago
- ☆17Mar 22, 2025Updated 11 months ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated 3 weeks ago
- This is a Login application for Android using Parse server.☆10Nov 26, 2018Updated 7 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- SkyRAT - Powershell Remote Administration Tool☆34Jan 8, 2018Updated 8 years ago
- ☆10Sep 3, 2021Updated 4 years ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 6 months ago
- The Scala programming language☆16Mar 31, 2023Updated 2 years ago
- A practical attack framework for precise enclave execution control☆471Jan 16, 2026Updated last month
- Documentation and proofs of concept on the polyglot file PEDICOM (PE executable + DICOM)☆38Apr 10, 2019Updated 6 years ago