flowyroll / downfallLinks
☆329Updated 2 years ago
Alternatives and similar repositories for downfall
Users that are interested in downfall are comparing it to the libraries listed below
Sorting:
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆491Updated 2 years ago
- ☆453Updated 3 years ago
- Next-gen Rowhammer fuzzer that uses non-uniform, frequency-based patterns (IEEE S&P '22).☆246Updated 2 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆176Updated 2 years ago
- GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers -- USENIX Security'24☆270Updated last year
- ☆113Updated 2 years ago
- ☆114Updated 2 years ago
- easylkb - Easy Linux Kernel Builder☆386Updated this week
- The first analysis framework for CPU microcode☆412Updated 2 years ago
- Training in Transient Execution and PhantomCALL, from Inception (SEC'23) Artifacts.☆41Updated last year
- ☆273Updated 10 months ago
- The xx file format. Turn your hex dumps into art, then into binary data.☆347Updated 2 years ago
- 📡🐧 Linux kernel syscall implementation tracker☆267Updated 4 months ago
- Damn Vulnerable UEFI☆298Updated last year
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆795Updated 3 years ago
- io_uring based rootkit☆249Updated 9 months ago
- 🌐🐧 Browsable Linux kernel syscall tables built with Systrack (https://github.com/mebeim/systrack)☆218Updated 4 months ago
- Kernel exploitation technique☆581Updated 2 years ago
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,380Updated last year
- ☆424Updated last year
- This repository contains exploit and reverse-engineering source code regarding the Spectre-BHB/Branch History Injection vulnerability☆118Updated 3 years ago
- Python Command-Line Ghidra Binary Diffing Engine☆735Updated 4 months ago
- Code Coverage Exploration Plugin for Ghidra☆374Updated last year
- ☆1,506Updated 3 years ago
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆175Updated 5 months ago
- ☆75Updated 5 months ago
- ☆470Updated 3 months ago
- Low-Level Software Security for Compiler Developers☆601Updated 2 months ago
- ☆104Updated last year
- XZ backdoor reverse engineering☆99Updated last year