flowyroll / downfallLinks
☆327Updated 2 years ago
Alternatives and similar repositories for downfall
Users that are interested in downfall are comparing it to the libraries listed below
Sorting:
- ☆454Updated 3 years ago
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆491Updated 2 years ago
- Next-gen Rowhammer fuzzer that uses non-uniform, frequency-based patterns (IEEE S&P '22).☆240Updated last year
- GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers -- USENIX Security'24☆270Updated last year
- Arbitrary Speculative Code Execution with Return Instructions☆171Updated last year
- ☆114Updated 2 years ago
- ☆273Updated 8 months ago
- ☆112Updated 2 years ago
- The first analysis framework for CPU microcode☆404Updated 2 years ago
- easylkb - Easy Linux Kernel Builder☆359Updated last year
- Training in Transient Execution and PhantomCALL, from Inception (SEC'23) Artifacts.☆40Updated last year
- Damn Vulnerable UEFI☆295Updated last year
- 📡🐧 Linux kernel syscall implementation tracker☆237Updated 2 months ago
- io_uring based rootkit☆244Updated 7 months ago
- This repository contains exploit and reverse-engineering source code regarding the Spectre-BHB/Branch History Injection vulnerability☆118Updated 3 years ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆798Updated 3 years ago
- CVE-2022-32947 walkthough and demo☆187Updated 2 years ago
- Kernel exploitation technique☆578Updated 2 years ago
- Artifacts for "ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms" (USENIX Security '24).☆59Updated 5 months ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆242Updated last year
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆176Updated 3 months ago
- ☆1,505Updated 3 years ago
- 🌐🐧 Browsable Linux kernel syscall tables built with Systrack (https://github.com/mebeim/systrack)☆204Updated 2 months ago
- ☆413Updated 2 weeks ago
- playing with DDR DRAM bus fault injection☆92Updated last year
- Proof-of-concept for the GhostWrite CPU bug.☆115Updated last year
- Linux Kernel Runtime Guard☆549Updated last month
- ☆78Updated 4 years ago
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,371Updated 10 months ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆114Updated 2 years ago