flowyroll / downfallLinks
☆329Updated 2 years ago
Alternatives and similar repositories for downfall
Users that are interested in downfall are comparing it to the libraries listed below
Sorting:
- ☆453Updated 3 years ago
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆491Updated 2 years ago
- Next-gen Rowhammer fuzzer that uses non-uniform, frequency-based patterns (IEEE S&P '22).☆243Updated last year
- GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers -- USENIX Security'24☆270Updated last year
- ☆115Updated 2 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆175Updated last year
- ☆113Updated 2 years ago
- The first analysis framework for CPU microcode☆411Updated 2 years ago
- easylkb - Easy Linux Kernel Builder☆381Updated last year
- Damn Vulnerable UEFI☆297Updated last year
- Training in Transient Execution and PhantomCALL, from Inception (SEC'23) Artifacts.☆41Updated last year
- 📡🐧 Linux kernel syscall implementation tracker☆241Updated 3 months ago
- ☆415Updated last week
- This repository contains exploit and reverse-engineering source code regarding the Spectre-BHB/Branch History Injection vulnerability☆118Updated 3 years ago
- Kernel exploitation technique☆581Updated 2 years ago
- ☆1,504Updated 3 years ago
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆175Updated 5 months ago
- 🌐🐧 Browsable Linux kernel syscall tables built with Systrack (https://github.com/mebeim/systrack)☆211Updated 3 months ago
- ☆470Updated 2 months ago
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,378Updated 11 months ago
- XZ backdoor reverse engineering☆99Updated last year
- ☆424Updated last year
- Lightweight fuzzing of a memory snapshot using KVM☆461Updated last year
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆242Updated last year
- ☆78Updated 4 years ago
- io_uring based rootkit☆247Updated 8 months ago
- Artifacts for "ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms" (USENIX Security '24).☆59Updated 6 months ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆796Updated 3 years ago
- CVE-2022-32947 walkthough and demo☆187Updated 2 years ago
- A minimal TLS 1.2 client implementation in a pure Bash script☆349Updated 2 years ago