flowyroll / downfallLinks
☆326Updated 2 years ago
Alternatives and similar repositories for downfall
Users that are interested in downfall are comparing it to the libraries listed below
Sorting:
- ☆453Updated 3 years ago
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆488Updated 2 years ago
- Next-gen Rowhammer fuzzer that uses non-uniform, frequency-based patterns (IEEE S&P '22).☆239Updated last year
- ☆112Updated 2 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆172Updated last year
- GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers -- USENIX Security'24☆269Updated last year
- easylkb - Easy Linux Kernel Builder☆359Updated last year
- The first analysis framework for CPU microcode☆402Updated 2 years ago
- ☆108Updated 2 years ago
- Training in Transient Execution and PhantomCALL, from Inception (SEC'23) Artifacts.☆39Updated last year
- ☆1,504Updated 3 years ago
- ☆273Updated 7 months ago
- The xx file format. Turn your hex dumps into art, then into binary data.☆345Updated 2 years ago
- Lightweight fuzzing of a memory snapshot using KVM☆461Updated last year
- Kernel exploitation technique☆578Updated 2 years ago
- ☆411Updated last week
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆241Updated last year
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆798Updated 3 years ago
- Linux Kernel Runtime Guard☆546Updated last month
- 📡🐧 Linux kernel syscall implementation tracker☆230Updated last month
- This repository contains exploit and reverse-engineering source code regarding the Spectre-BHB/Branch History Injection vulnerability☆118Updated 3 years ago
- io_uring based rootkit☆243Updated 6 months ago
- Damn Vulnerable UEFI☆291Updated last year
- Binary Golf Examples and Resources☆259Updated 3 weeks ago
- ☆467Updated 2 weeks ago
- XZ backdoor reverse engineering☆98Updated last year
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆114Updated 2 years ago
- ☆643Updated 7 months ago
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,370Updated 9 months ago
- CVE-2022-32947 walkthough and demo☆187Updated 2 years ago