felixwilhelm / mario_baslrLinks
PoC for breaking hypervisor ASLR using branch target buffer collisions
☆166Updated 8 years ago
Alternatives and similar repositories for mario_baslr
Users that are interested in mario_baslr are comparing it to the libraries listed below
Sorting:
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 8 years ago
- A program to draw rectangles from heap traces.☆135Updated 5 years ago
- An open source, multi-architecture ROP compiler written in python☆162Updated 8 years ago
- Symbolic Execution Tool in r2☆105Updated 3 years ago
- ☆163Updated 8 years ago
- Automated Return-Oriented Programming Chaining☆85Updated 8 years ago
- Synesthesia, implemented as Yices scripts☆94Updated 7 years ago
- Slides and very basic examples☆112Updated 8 years ago
- Library for creating CTF services.☆74Updated 8 years ago
- ☆105Updated 10 years ago
- High-throughput fuzzer and emulator of DECREE binaries☆243Updated 5 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆170Updated 10 years ago
- Small tool for generating ropchains using unicorn and z3☆198Updated 7 years ago
- De Mysteriis Dom jemalloc☆65Updated 7 years ago
- Notes on various topics I'm interested in☆160Updated 9 years ago
- A Python extension for managing External Memory Data Structures (EMDs)☆50Updated 10 months ago
- Short, unrelated helper scripts for users of AFL (the fuzzer)☆112Updated 8 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- ☆124Updated 4 years ago
- Implementation of the SMM rootkit "The Watcher"☆128Updated 3 years ago
- ☆49Updated 7 years ago
- Exploitation on ARM-based Systems (Troopers18)☆148Updated 7 years ago
- ☆28Updated 2 years ago
- Routines for hunting down kernel symbols.☆82Updated 14 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆185Updated 2 years ago
- Attacking the Core associated source files☆89Updated 7 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- ☆76Updated last year
- [DEPRECATED] A symbolic execution engine for the VEX IR☆79Updated 6 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 7 years ago