Working Set Page Cache side-channel IPC PoC
☆68Jan 9, 2019Updated 7 years ago
Alternatives and similar repositories for wsIPC
Users that are interested in wsIPC are comparing it to the libraries listed below
Sorting:
- Source code for DABANGG attack.☆10Mar 26, 2022Updated 3 years ago
- Released presentations of my talks + code that used during these talks☆15Sep 5, 2024Updated last year
- ☆13Apr 27, 2020Updated 5 years ago
- fyyre.l2-fashion.de .. old site☆17Apr 27, 2022Updated 3 years ago
- QEMU to drcov trace file☆11Nov 21, 2020Updated 5 years ago
- Escalation of privilege exploit for Dell BIOS flasher (Flash64W) (2017)☆13Dec 7, 2020Updated 5 years ago
- Microbenchmarking experiments on Zen 2 machines☆21Jun 25, 2022Updated 3 years ago
- A proof-of-concept DLL that prints out the password a user enters into Veracrypt while decrypting a volume.☆15Oct 26, 2018Updated 7 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Python Read/Write Everything Wrapper☆16Apr 19, 2022Updated 3 years ago
- allowing um r/w through km from um ioctl ™☆11Jan 2, 2022Updated 4 years ago
- x86 virtualization study notes using Intel VT-x☆22Jan 3, 2014Updated 12 years ago
- Run Managed Assemblies with RunDll☆17Jul 2, 2018Updated 7 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆24Nov 12, 2019Updated 6 years ago
- Enabled / Disable LSA Protection via BYOVD☆81Dec 8, 2021Updated 4 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Jan 29, 2020Updated 6 years ago
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆21Jul 4, 2024Updated last year
- ☆26Sep 29, 2018Updated 7 years ago
- AMD SVM hypervisor rootkit proof of concept☆49Sep 23, 2023Updated 2 years ago
- ☆48Nov 4, 2022Updated 3 years ago
- Just another casual shellcode native loader☆25Feb 3, 2022Updated 4 years ago
- A tool to create COM class/interface relationships in neo4j☆50Oct 12, 2022Updated 3 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- Security Product Taskbar Icons (to identify from screenshots)☆58Mar 27, 2020Updated 5 years ago
- ☆24Nov 22, 2020Updated 5 years ago
- PoC exploit for late August 2018 Task Scheduler ALPC Vulnerability☆24Oct 10, 2019Updated 6 years ago
- x86_64, PE32+, FAT32 bootloader☆28Jul 4, 2021Updated 4 years ago
- Make the Windows API in Ghidra easy to read and informative.☆28Jan 10, 2022Updated 4 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- Symbolic expression simplifier used across VTIL toolchain. Moved into -->☆25May 2, 2020Updated 5 years ago
- A rust based DLL injection project☆31Sep 18, 2022Updated 3 years ago
- Purpose-built Red Team network hardware implant made from common components.☆27Mar 18, 2023Updated 2 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- Crystal Anti-Exploit Protection 2012☆37May 31, 2020Updated 5 years ago
- ☆24Feb 19, 2017Updated 9 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- A POC for Windows Extension Host hooking☆24Jul 13, 2019Updated 6 years ago
- The firmware, gateware, and host software of the ESP CPA Board.☆29Apr 30, 2024Updated last year
- Tools made for my Hyper-V blog series @ https://foxhex0ne.blogspot.com/☆58Jun 21, 2020Updated 5 years ago