comsec-group / bprcLinks
☆71Updated 3 months ago
Alternatives and similar repositories for bprc
Users that are interested in bprc are comparing it to the libraries listed below
Sorting:
- ☆74Updated last year
- Spectre based on Linear Address Masking☆69Updated last year
- Binary exploitation by confusing the unwinder☆63Updated 2 years ago
- Binary Type Inference Ghidra Plugin☆165Updated last year
- ☆182Updated last year
- Proof-of-concept for the GhostWrite CPU bug.☆116Updated last year
- Arbitrary Speculative Code Execution with Return Instructions☆162Updated last year
- ☆104Updated last year
- High performance fuzzing using riscv to x86 binary translations and modern fuzzing techniques☆153Updated last year
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆62Updated last year
- ☆59Updated 5 months ago
- Kernel Read Write Execute☆45Updated 7 months ago
- An educational Bochs-based snapshot fuzzer project☆185Updated 3 months ago
- Binarly Vulnerability Research Advisories☆179Updated 3 weeks ago
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆63Updated 3 months ago
- A custom ELF linker/loader for installing ET_REL binary patches at runtime☆169Updated last week
- Shiva is a programmable dynamic linker for loading ELF microprograms☆34Updated last year
- VirtFuzz is a Linux Kernel Fuzzer that uses VirtIO to provide inputs into the kernels subsystem. It is built with LibAFL.☆125Updated last year
- ☆131Updated 3 months ago
- ☆74Updated 8 months ago
- PoC for PixieFail vulnerabilities☆23Updated last year
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆62Updated last year
- A tool to perform so called BGE attack☆25Updated 2 months ago
- Write dynamic binary analysis tools in Python☆118Updated 3 weeks ago
- ☆17Updated 8 months ago
- A collection of my weggli patterns to facilitate vulnerability research.☆142Updated 3 months ago
- A tool for automating setup of kernel pwn challenges☆61Updated 2 months ago
- Artifacts for "ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms" (USENIX Security '24).☆54Updated 2 months ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆50Updated 2 months ago
- Same-Architecture Firmware Rehosting and Fuzzing☆127Updated 8 months ago