es0j / CVE-2023-0045View external linksLinks
☆14Feb 7, 2023Updated 3 years ago
Alternatives and similar repositories for CVE-2023-0045
Users that are interested in CVE-2023-0045 are comparing it to the libraries listed below
Sorting:
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆19Feb 10, 2025Updated last year
- ☆74Nov 19, 2022Updated 3 years ago
- A in-the-wild V8 type confusion bug.☆29Aug 8, 2025Updated 6 months ago
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆21Jul 4, 2024Updated last year
- Proof of Concept of exploit against Spectre Variant 2 Vulnerability☆22May 23, 2020Updated 5 years ago
- ☆25Aug 9, 2021Updated 4 years ago
- The official challenges and deployment source code files used in San Diego CTF 2022.☆28May 14, 2022Updated 3 years ago
- ☆35Feb 3, 2025Updated last year
- CVE-2023-0297: The Story of Finding Pre-auth RCE in pyLoad☆28Jan 14, 2023Updated 3 years ago
- Injecting into SELinux-protected system service processes under root on Android.☆50Feb 28, 2024Updated last year
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- Plugin interface for remote communications with Binary Ninja database and MCP server for interfacing with LLMs.☆55May 21, 2025Updated 8 months ago
- Challenge handouts, source code, and solutions for UofTCTF 2026☆35Jan 13, 2026Updated last month
- ☆12Feb 8, 2021Updated 5 years ago
- frameworks_base for Geeksphone Peak and Keon☆12Jan 13, 2015Updated 11 years ago
- WinDbg plugin to trace module transitions from a debugged driver.☆40Dec 22, 2025Updated last month
- ☆11Mar 2, 2022Updated 3 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆18Mar 22, 2020Updated 5 years ago
- Windows Power Plan Control (PowerShell)☆13Jan 18, 2025Updated last year
- Primary information center for The Fresh Project.☆11Aug 3, 2025Updated 6 months ago
- Exploiting Android devices☆10Sep 12, 2022Updated 3 years ago
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- BUSted!!! Microarchitectural Side-Channel Attacks on the MCU Bus Interconnect☆11May 21, 2024Updated last year
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- An IOKit kext designed for microarchitectural security research on M1☆46Oct 30, 2022Updated 3 years ago
- ☆12Mar 10, 2024Updated last year
- A PoC for CVE-2022-2588 that triggers a WARNING☆10Sep 28, 2022Updated 3 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- A repository containing sample srop exploits and vulnerable binaries.☆12Sep 17, 2019Updated 6 years ago
- ☆12Jun 8, 2021Updated 4 years ago
- Take control of your friends wallpapers☆13Jun 11, 2025Updated 8 months ago
- Various CTF challenge solutions☆12Apr 20, 2021Updated 4 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- AFL++(2.63c/2.65c) + aflsmart(5ad7ea3)☆11Oct 20, 2020Updated 5 years ago
- ☆11Aug 18, 2023Updated 2 years ago
- MouHidInputHook enables users to filter, modify, and inject mouse input data packets into the input data stream of HID USB mouse devices …☆11Jul 11, 2019Updated 6 years ago
- ☆11Apr 9, 2024Updated last year
- Bash script for changing all filenames in the current dir to reverse filenames.☆10Mar 10, 2019Updated 6 years ago