iTLB multihit PoC
☆42Nov 4, 2023Updated 2 years ago
Alternatives and similar repositories for itlb_poc
Users that are interested in itlb_poc are comparing it to the libraries listed below
Sorting:
- QEMU to drcov trace file☆11Nov 21, 2020Updated 5 years ago
- ☆58Feb 19, 2026Updated 2 weeks ago
- ☆24Aug 27, 2021Updated 4 years ago
- WinDbg plugin to trace module transitions from a debugged driver.☆40Dec 22, 2025Updated 2 months ago
- Generate a PDB file given the old PDB file and an address mapping☆52Aug 3, 2025Updated 7 months ago
- ASUSTeK AsIO3 I/O driver unlock☆23Apr 22, 2021Updated 4 years ago
- A collection of my scripts for research☆12Jul 28, 2025Updated 7 months ago
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- break link between dll and it file on disk☆12Sep 2, 2024Updated last year
- The Binary Code Recognition Library for game hacking/modding and function reidentification for linux☆13Jan 25, 2026Updated last month
- ☆16Dec 3, 2020Updated 5 years ago
- Redirect spawned iOS application stdout and stderr to pty☆29Jan 29, 2025Updated last year
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Apr 23, 2020Updated 5 years ago
- A custom ELF linker/loader for installing ET_REL binary patches at runtime☆197Feb 13, 2026Updated 3 weeks ago
- Calltree generator for Binary Ninja☆45Nov 13, 2025Updated 3 months ago
- amd-nv-tool can extract and modify information from BIOS images of AMD systems☆14Jan 7, 2026Updated last month
- ☆13Jul 31, 2020Updated 5 years ago
- A repository with UEFI research stuff☆16Jun 23, 2023Updated 2 years ago
- JDWP (Java Debug Wire Protocol) analysis tool to help you debug your JVM or Debugger☆13Aug 21, 2014Updated 11 years ago
- CVE-2021-39685 Description and sample exploit for Linux USB Gadget overflow vulnerability☆14Apr 28, 2022Updated 3 years ago
- LM32 processor module for Ghidra. Useful for AMD SMU reverse engineering.☆15Dec 7, 2025Updated 2 months ago
- Source data & analysis of NSA SECONDDATE packet-injection framework☆11Apr 9, 2017Updated 8 years ago
- iOS/macOS: task_swap_mach_voucher() does not respect MIG semantics leading to use-after-free☆11Jan 30, 2019Updated 7 years ago
- Escalation of privilege exploit for Dell BIOS flasher (Flash64W) (2017)☆13Dec 7, 2020Updated 5 years ago
- Microbenchmarking experiments on Zen 2 machines☆21Jun 25, 2022Updated 3 years ago
- Phrack Crackme Challenges☆21Apr 24, 2025Updated 10 months ago
- Proof-of-concept for the paper "StackWarp: Breaking AMD SEV-SNP Integrity via Deterministic Stack-Pointer Manipulation through the CPU’s …☆90Jan 30, 2026Updated last month
- Minimal CPU Emulator Powered by the ARM PL080 DMA Controller☆36Jul 25, 2024Updated last year
- SPI flash read MitM attack PoC☆40May 24, 2022Updated 3 years ago
- CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code☆37Sep 8, 2020Updated 5 years ago
- Universal Profiling as a desktop app☆100Feb 18, 2026Updated 2 weeks ago
- PSP emulator☆92May 2, 2021Updated 4 years ago
- kCFI Documentation☆15Apr 18, 2017Updated 8 years ago
- ☆20Jul 11, 2021Updated 4 years ago
- Ghidra consonance and make it more ida-ish☆16Mar 11, 2019Updated 6 years ago
- a friendly implementation of nyx ontop of firecracker instead of QEMU. Easier to use & cleaner code☆30Jan 20, 2026Updated last month
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- Dice CTF 2022 breach write-up☆15Feb 14, 2022Updated 4 years ago
- Static Binary Instrumentation tool for Windows x64 executables☆206Sep 29, 2025Updated 5 months ago