ergot86 / itlb_pocLinks
iTLB multihit PoC
☆41Updated last year
Alternatives and similar repositories for itlb_poc
Users that are interested in itlb_poc are comparing it to the libraries listed below
Sorting:
- weggli ruleset scanner for source code and binaries☆29Updated last month
- TrustZone Trusted Application 0-Days by Design☆22Updated 2 months ago
- SPI flash read MitM attack PoC☆38Updated 3 years ago
- Experiments, snippets and other things related to Binary Ninja☆17Updated 8 months ago
- Research tools developed for Intel Wi-Fi chips☆55Updated 3 weeks ago
- hypervisor enforced patch protection for the linux kernel with xen + libvmi, libvmi KASLR offset spoofer☆33Updated last year
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆49Updated last year
- Slides about HyperDbg☆30Updated 3 months ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆47Updated last month
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆85Updated 2 years ago
- ugly code to check linux kernel memory and dump some internal structures☆47Updated 7 months ago
- Asus AsIO2 Local Privilege Escalation exploit (based on ReWolf's MSI exploit)☆13Updated 5 years ago
- ☆74Updated 7 months ago
- BINARLY Research Tools and PoCs☆36Updated 9 months ago
- Another (bad) ROP gadget finder, but this time in Rust☆21Updated last year
- ☆78Updated 2 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆116Updated 8 months ago
- One Bootloader to Load Them All - Research materials, Code , Etc.☆52Updated 2 years ago
- Ghidra data type archive for Windows driver analysis☆25Updated 9 months ago
- Configure SPI flash write protection.☆24Updated 5 years ago
- Binary code coverage visualizer plugin for Ghidra - just without crashes on unknown insns☆19Updated 8 months ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- Breaking Secure Boot with SMM☆41Updated 3 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 2 years ago
- A tool to perform so called BGE attack☆24Updated 3 weeks ago
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆48Updated 8 months ago
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆35Updated last year
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 3 years ago
- Simple PoC for a bootkit written as a UEFI Option ROM Driver☆10Updated 2 years ago
- ☆26Updated 5 months ago