Collection of RISC-V exploits
☆34Nov 10, 2019Updated 6 years ago
Alternatives and similar repositories for riscv_exploitation
Users that are interested in riscv_exploitation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Show syscall information for different architectures☆15Aug 26, 2017Updated 8 years ago
- Short handy snippets from the @mwrlabs team☆20Jan 30, 2018Updated 8 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆24Jun 22, 2018Updated 7 years ago
- A toy Linux rootkit.☆13May 10, 2013Updated 13 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Sep 30, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A portable version of OpenBSD's privsep/sandboxed file(1) utility☆30Oct 31, 2024Updated last year
- A python library to find one-gadget☆31Feb 22, 2019Updated 7 years ago
- Tools for unpacking and repacking firmware images for the Insta360 X3☆13Sep 19, 2023Updated 2 years ago
- Modding the LOOΠΔ light stick with a custom PCB/firmware, rechargeable battery and a companion Android app for wireless control.☆13Sep 16, 2022Updated 3 years ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Jun 18, 2019Updated 6 years ago
- Literally does the opposite of Ciphey. Encrypts text.☆11Feb 25, 2021Updated 5 years ago
- RISC-V Soft CPU Security Contest by Thales and Microchip Technology☆12Jul 29, 2019Updated 6 years ago
- Adding trace to DesignStart for easier side-channel analysis on the CW305 target. Also supports PhyWhisperer.☆17Feb 19, 2025Updated last year
- Check Diffie Hellman group prime parameter☆11Jan 29, 2016Updated 10 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Real-time speech-to-text translation over WebSocket. Streams Opus or raw PCM audio from client to server for live transcription and optio…☆15Mar 11, 2026Updated 2 months ago
- Define and generate waveforms to output with your favorite DAC☆12Jan 2, 2019Updated 7 years ago
- A Basic BBI Tool - So Simple, But So Good!☆33Dec 13, 2021Updated 4 years ago
- RISC-V Instruction Set Metadata☆42Oct 21, 2018Updated 7 years ago
- Parallel ssdeep clustering kit☆20Dec 24, 2017Updated 8 years ago
- Workaround for "key must be a string" error with serde_json. De/serialize any HashMap<K,V>, Vec<(K,V)>, Iter<(&K,&V)>, or Iter<&(K,V)> as…☆14Mar 18, 2026Updated 2 months ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- From datasheet (pdf) to SVD... to then be fed into svd2rust☆10May 26, 2022Updated 3 years ago
- Guide to rooting and custom firmware on Samsung Galaxy S3 i9300☆10Apr 28, 2026Updated 3 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆10Oct 22, 2017Updated 8 years ago
- ☆13May 6, 2026Updated 2 weeks ago
- The yaml documents for the CTFman search system.☆12May 16, 2019Updated 7 years ago
- Merke tree visualization library for browser, works with merkletreejs☆24Nov 18, 2022Updated 3 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Sep 9, 2018Updated 7 years ago
- A stacked docker environment for solving CTF PWN challenges.☆10Dec 4, 2021Updated 4 years ago
- ☆13Oct 3, 2023Updated 2 years ago
- Tools for "Another Flip in the Wall"☆41Jun 12, 2018Updated 7 years ago
- pwntools library implementation in c++☆49Apr 11, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Collection of Web3 Audits and Publications by ChainLight of Theori☆14Oct 30, 2023Updated 2 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- iOS 11.3.1 exploit☆48Dec 26, 2018Updated 7 years ago
- Aeternity virtual machines byte code modules☆14Apr 26, 2024Updated 2 years ago
- IDA processor module for Renesas RX63 MCU☆14Nov 10, 2025Updated 6 months ago
- Compilation of peHash implementations.☆15May 2, 2019Updated 7 years ago
- ☆14Aug 24, 2020Updated 5 years ago