chrysh / riscv_exploitationLinks
Collection of RISC-V exploits
☆32Updated 6 years ago
Alternatives and similar repositories for riscv_exploitation
Users that are interested in riscv_exploitation are comparing it to the libraries listed below
Sorting:
- Alphanumeric+1 shellcoding tools for RISC-V☆37Updated 6 years ago
- CPU Adventure 2 challenge from the Dragon CTF 2019☆16Updated 7 months ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆42Updated 7 years ago
- (Linux Kernel) Stack Monitoring Tool☆48Updated 3 years ago
- IPC scripts for access to Intel CRBUS☆120Updated 4 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆34Updated 7 years ago
- CSAW Embedded Security Challenge 2020☆26Updated 5 years ago
- Launch radare2 like a boss from pwntools in tmux☆23Updated 6 years ago
- ASLREKT is a proof of concept for an unfixed generic local ASLR bypass in Linux.☆26Updated 5 years ago
- Brute forcing scripts for bad CTF problems☆47Updated 5 years ago
- Stuff from CTF contests☆39Updated 6 years ago
- LKRG bypass methods☆73Updated 6 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆128Updated 8 years ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆73Updated last year
- ☆74Updated 8 years ago
- Ledger Donjon CTF 2020☆17Updated 4 years ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆30Updated 9 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆114Updated 7 years ago
- ☆36Updated 4 years ago
- Basic BIOS emulator for Unicorn Engine.☆100Updated 4 years ago
- Docs and resources on CPU Speculative Execution bugs☆376Updated 7 years ago
- Linux kernel JIT spray for SMEP / KERNEXEC bypass☆55Updated 13 years ago
- Notes on QEMU and Debian MIPS (big-endian)☆45Updated 7 years ago
- ☆37Updated 4 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆81Updated 6 years ago
- Framework for building transparent memory encryption and authentication solutions☆27Updated 7 years ago
- TPM-Fail Attack code & data☆124Updated 2 years ago
- Mimojas Firmware Toolkit for unpacking and analysis firmware images☆14Updated 5 years ago
- Exploit generator for Intel ME 11 buffer overflow☆34Updated 6 years ago
- Intel Management Engine firmware loader plugin for IDA☆93Updated 8 years ago