This repository contains the sources and documentation for the SWAPGS attack PoC (CVE-2019-1125)
☆41Jan 27, 2020Updated 6 years ago
Alternatives and similar repositories for swapgs-attack-poc
Users that are interested in swapgs-attack-poc are comparing it to the libraries listed below
Sorting:
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- Fork of KVM with Virtual Machine Introspection patches☆37Jan 22, 2026Updated last month
- a network filter using NDIS hook technique☆19Mar 28, 2013Updated 12 years ago
- Driver demonstrating how to register a DPC to asynchronously wait on an object☆50Jan 15, 2021Updated 5 years ago
- Proof-of-concept implementation for the paper "Osiris: Automated Discovery of Microarchitectural Side Channels" (USENIX Security'21)☆65Jun 4, 2025Updated 9 months ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆134Jan 9, 2018Updated 8 years ago
- A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.☆38Mar 16, 2022Updated 3 years ago
- A System Level RISCV32 Emulator Over x86_64: capable of booting RISCV Linux☆28Aug 3, 2021Updated 4 years ago
- This is a demo project to illustrate the way to verify and restore original SST in case of some malware hooks☆33Mar 2, 2017Updated 9 years ago
- ☆35Dec 20, 2020Updated 5 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- 进程内优雅地拦截SPI/LSP模块。 Manage SPI/LSP in a graceful way within private process.☆11Dec 28, 2017Updated 8 years ago
- A log4shell detector using ProGuardCORE☆10Aug 5, 2022Updated 3 years ago
- ☆17Mar 22, 2025Updated 11 months ago
- A Windows kernel driver unit testing framework. Provides a macro free modern cpp syntax. Includes tools for automatic running on your vm.☆11May 15, 2023Updated 2 years ago
- Show Window proxy settings☆16Oct 19, 2016Updated 9 years ago
- ☆48Jun 30, 2020Updated 5 years ago
- vm escape exploit☆39Sep 24, 2017Updated 8 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104May 14, 2020Updated 5 years ago
- Cachebench, with hacks to make it run on SmartOS / x86.☆12Feb 15, 2012Updated 14 years ago
- ☆10Nov 8, 2019Updated 6 years ago
- 使用kcp实现的socks5正向代理☆12Dec 9, 2023Updated 2 years ago
- 轻量级 Web 工具箱☆10Mar 22, 2025Updated 11 months ago
- Hands-on experiments to demonstrate the exploitability of insecure TLS configurations in Android apps☆15Jan 18, 2022Updated 4 years ago
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆26Feb 4, 2026Updated last month
- repository containing some nmap scripts☆16Jan 15, 2021Updated 5 years ago
- a complete rewrite of wscript.exe, for *NIX☆13Nov 2, 2018Updated 7 years ago
- A coverage library for Chisel designs☆11Mar 12, 2020Updated 5 years ago
- Ten Thousand Failures Blog☆12Jul 22, 2014Updated 11 years ago
- Lists work items being queued currently.☆14Jun 7, 2015Updated 10 years ago
- School Project for Course "System Programming"☆15Jan 16, 2022Updated 4 years ago
- Telegram-based PowerShell Runspace Host☆11Dec 8, 2022Updated 3 years ago
- Linux kernel module that provides remote backdoor using netfilters , file and pid hiding.☆11Apr 1, 2017Updated 8 years ago
- ☆11Jan 24, 2022Updated 4 years ago
- Scrape New Zealand's COVID-19 case, alert level and hardship grant information from government web pages, and render the data in various …☆11Jul 5, 2020Updated 5 years ago
- adobe reader sandbox utility☆11Aug 7, 2020Updated 5 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- Post-Silicon Validation Tool based on REVERSI☆12Dec 10, 2025Updated 2 months ago
- A simple baremetal program template for RISC-V inspired from riscv benchmark tests☆11Apr 17, 2018Updated 7 years ago