flowyroll / downfallLinks
☆324Updated last year
Alternatives and similar repositories for downfall
Users that are interested in downfall are comparing it to the libraries listed below
Sorting:
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆479Updated last year
- ☆449Updated 2 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆162Updated last year
- ☆95Updated last year
- GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers -- USENIX Security'24☆261Updated last year
- Next-gen Rowhammer fuzzer that uses non-uniform, frequency-based patterns (IEEE S&P '22).☆230Updated last year
- ☆112Updated last year
- The first analysis framework for CPU microcode☆394Updated 2 years ago
- io_uring based rootkit☆206Updated 2 months ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆237Updated last year
- ☆1,495Updated 2 years ago
- easylkb - Easy Linux Kernel Builder☆346Updated 11 months ago
- 📡🐧 Linux kernel syscall implementation tracker☆216Updated 2 months ago
- ☆453Updated last week
- ☆426Updated 6 months ago
- Damn Vulnerable UEFI☆283Updated 9 months ago
- Lightweight fuzzing of a memory snapshot using KVM☆452Updated last year
- ☆271Updated 3 months ago
- UEFI and SMM Assessment Tool☆191Updated 7 months ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆790Updated 2 years ago
- Kernel exploitation technique☆575Updated last year
- This repository contains exploit and reverse-engineering source code regarding the Spectre-BHB/Branch History Injection vulnerability☆117Updated 3 years ago
- CVE-2022-32947 walkthough and demo☆172Updated last year
- Code Coverage Exploration Plugin for Ghidra☆355Updated 11 months ago
- baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability☆329Updated last year
- ☆320Updated last year
- Memory-Dump-UEFI is a UEFI application for dumping the contents of RAM.☆156Updated 3 months ago
- Intel Management Engine JTAG Proof of Concept☆141Updated 5 years ago
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,351Updated 4 months ago
- Binary Golf Grand Prix☆112Updated last year