comsec-group / bprcLinks
☆73Updated 2 months ago
Alternatives and similar repositories for bprc
Users that are interested in bprc are comparing it to the libraries listed below
Sorting:
- ☆75Updated last year
- Binary exploitation by confusing the unwinder☆66Updated 2 years ago
- Spectre based on Linear Address Masking☆67Updated last year
- Proof-of-concept for the GhostWrite CPU bug.☆115Updated last year
- ☆33Updated 9 months ago
- ☆105Updated last year
- Arbitrary Speculative Code Execution with Return Instructions☆172Updated last year
- ☆60Updated 3 months ago
- ☆185Updated last year
- Binary Type Inference Ghidra Plugin☆166Updated last year
- A tool for firmware cartography☆161Updated 5 months ago
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆64Updated last year
- Binarly Vulnerability Research Advisories☆182Updated last month
- Blogpost about optimizing binary-only fuzzing with AFL++☆71Updated 2 years ago
- Uncovering Container Confusion in the Linux Kernel☆45Updated last year
- ☆79Updated 11 months ago
- High performance fuzzing using riscv to x86 binary translations and modern fuzzing techniques☆153Updated last year
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆66Updated last week
- An educational Bochs-based snapshot fuzzer project☆217Updated 3 weeks ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- ☆133Updated last month
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆66Updated 6 months ago
- This repo demonstrates the Return-to-Non-Secure (ret2ns) vulnerability on ARM Cortex-M TrustZone. It contains the attack and defense demo…☆34Updated 3 weeks ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆84Updated 2 years ago
- A collection of my weggli patterns to facilitate vulnerability research.☆148Updated last week
- Artifacts for "ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms" (USENIX Security '24).☆58Updated 5 months ago
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆50Updated last year
- weggli ruleset scanner for source code and binaries☆35Updated this week
- Decrypt TP-Link Firmware☆51Updated last month
- Same-Architecture Firmware Rehosting and Fuzzing☆125Updated 11 months ago