donbmouse / riscv-security
Lab Mouse Security research pertaining to RISC-V
☆11Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for riscv-security
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆40Updated 6 years ago
- Routines for hunting down kernel structs.☆40Updated 13 years ago
- Bootloader research tools (very much a work in progress)☆37Updated 5 years ago
- kCFI Documentation☆14Updated 7 years ago
- Mimojas Firmware Toolkit for unpacking and analysis firmware images☆13Updated 4 years ago
- Root Repo for the EPOXY tool that applies Privilege Overlays on bare-metal systems☆33Updated 7 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆39Updated 6 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆35Updated 8 years ago
- Writeups of CTF challenges I do☆13Updated 5 years ago
- ARM rop chain gadget searcher☆37Updated 7 years ago
- QEmu backend for avatar²☆20Updated last week
- REIL translation library☆36Updated 8 years ago
- Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap☆22Updated 7 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆20Updated 4 years ago
- MapGuard is a library that enforces a security policy for mmap based page allocations.☆21Updated 2 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆73Updated 5 years ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 2 years ago
- A library for performing memory forensics over the IEEE 1394 interface.☆18Updated 6 years ago
- Tool to view heap chunks and memory writes (using pintool)☆39Updated 5 years ago
- python library for dumping a linux process from memory☆34Updated 14 years ago
- A GCC plugin implementing various stack canaries.☆14Updated 12 years ago
- Tracing framework for full system simulators☆54Updated 9 years ago
- Framework for building transparent memory encryption and authentication solutions☆25Updated 6 years ago
- A set of tools based on radare2 for analysis of ROP gadgets and payloads.☆15Updated 8 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆27Updated 8 years ago