ergot86 / itlb_pocView external linksLinks
iTLB multihit PoC
☆42Nov 4, 2023Updated 2 years ago
Alternatives and similar repositories for itlb_poc
Users that are interested in itlb_poc are comparing it to the libraries listed below
Sorting:
- ☆58Jul 31, 2025Updated 6 months ago
- ☆24Aug 27, 2021Updated 4 years ago
- Generate a PDB file given the old PDB file and an address mapping☆51Aug 3, 2025Updated 6 months ago
- WinDbg plugin to trace module transitions from a debugged driver.☆40Dec 22, 2025Updated last month
- ASUSTeK AsIO3 I/O driver unlock☆23Apr 22, 2021Updated 4 years ago
- break link between dll and it file on disk☆12Sep 2, 2024Updated last year
- A collection of my scripts for research☆12Jul 28, 2025Updated 6 months ago
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- The Binary Code Recognition Library for game hacking/modding and function reidentification for linux☆12Jan 25, 2026Updated 2 weeks ago
- ☆16Dec 3, 2020Updated 5 years ago
- Redirect spawned iOS application stdout and stderr to pty☆29Jan 29, 2025Updated last year
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Apr 23, 2020Updated 5 years ago
- A custom ELF linker/loader for installing ET_REL binary patches at runtime☆191Updated this week
- amd-nv-tool can extract and modify information from BIOS images of AMD systems☆14Jan 7, 2026Updated last month
- LM32 processor module for Ghidra. Useful for AMD SMU reverse engineering.☆14Dec 7, 2025Updated 2 months ago
- ☆13Jul 31, 2020Updated 5 years ago
- A repository with UEFI research stuff☆16Jun 23, 2023Updated 2 years ago
- Little Kernel for Hyper-V arm64 Guest☆31Jan 23, 2022Updated 4 years ago
- Microbenchmarking experiments on Zen 2 machines☆21Jun 25, 2022Updated 3 years ago
- Escalation of privilege exploit for Dell BIOS flasher (Flash64W) (2017)☆13Dec 7, 2020Updated 5 years ago
- iOS/macOS: task_swap_mach_voucher() does not respect MIG semantics leading to use-after-free☆11Jan 30, 2019Updated 7 years ago
- Source data & analysis of NSA SECONDDATE packet-injection framework☆11Apr 9, 2017Updated 8 years ago
- SPI flash read MitM attack PoC☆40May 24, 2022Updated 3 years ago
- CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code☆37Sep 8, 2020Updated 5 years ago
- Windows Active DIrectory Pentesting documentation.☆19Jun 14, 2024Updated last year
- ☆26Jan 16, 2026Updated 3 weeks ago
- PSP emulator☆93May 2, 2021Updated 4 years ago
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- ☆20Jul 11, 2021Updated 4 years ago
- Dice CTF 2022 breach write-up☆15Feb 14, 2022Updated 3 years ago
- kCFI Documentation☆14Apr 18, 2017Updated 8 years ago
- Plugin interface for remote communications with Binary Ninja database and MCP server for interfacing with LLMs.☆54May 21, 2025Updated 8 months ago
- Static Binary Instrumentation tool for Windows x64 executables☆207Sep 29, 2025Updated 4 months ago
- ☆41Jun 6, 2021Updated 4 years ago
- Corpus set used by DIE☆41May 20, 2020Updated 5 years ago
- Kernel Stack info leak at exportObjectToClient function☆42May 21, 2019Updated 6 years ago
- Support of Nvidia Falcon processors for Ghidra☆74Sep 7, 2024Updated last year
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- dk is a WinDbg extenion for dumping memory data in meaningful and organized ways, it is an enhancement of my previous tokenext project.☆26Feb 2, 2026Updated last week