chrysh / riscv_exploitationLinks
Collection of RISC-V exploits
☆30Updated 5 years ago
Alternatives and similar repositories for riscv_exploitation
Users that are interested in riscv_exploitation are comparing it to the libraries listed below
Sorting:
- Alphanumeric+1 shellcoding tools for RISC-V☆36Updated 5 years ago
- QARMA block cipher in C☆30Updated 2 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆33Updated 7 years ago
- (Linux Kernel) Stack Monitoring Tool☆45Updated 3 years ago
- Mimojas Firmware Toolkit for unpacking and analysis firmware images☆14Updated 5 years ago
- CPU Adventure 2 challenge from the Dragon CTF 2019☆16Updated last month
- Fork of KVM with Virtual Machine Introspection patches☆36Updated last year
- experimentation/code from Tanguy Dubroca (summer 2019)☆28Updated 5 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆41Updated 6 years ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆30Updated 8 years ago
- Exploit generator for Intel ME 11 buffer overflow☆33Updated 5 years ago
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- iTLB multihit PoC☆41Updated last year
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 6 years ago
- Framework for building transparent memory encryption and authentication solutions☆27Updated 7 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- A tool to perform so called BGE attack☆24Updated last week
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago
- Slides and stuffs of the meetings during the 2020.☆16Updated 3 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- Linux kernel JIT spray for SMEP / KERNEXEC bypass☆55Updated 12 years ago
- Low Pin Count (LPC) Analyzer for Saleae Logic☆17Updated last year
- ☆23Updated 4 years ago
- A tool for detecting Spectre vulnerabilities through fuzzing☆41Updated 3 years ago
- Lab Mouse Security research pertaining to RISC-V☆11Updated 8 years ago
- Diary of a reverse-engineer blog☆20Updated last year
- A framework for parsing binary data.☆17Updated 2 years ago
- Detect patterns of bad behavior in function calls☆26Updated 4 years ago
- LKRG bypass methods☆72Updated 5 years ago
- ☆74Updated 4 years ago