flowyroll / downfallLinks
☆329Updated 2 years ago
Alternatives and similar repositories for downfall
Users that are interested in downfall are comparing it to the libraries listed below
Sorting:
- ☆453Updated 3 years ago
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆491Updated 2 years ago
- ☆114Updated 2 years ago
- Next-gen Rowhammer fuzzer that uses non-uniform, frequency-based patterns (IEEE S&P '22).☆246Updated 2 years ago
- ☆113Updated 2 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆176Updated 2 years ago
- GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers -- USENIX Security'24☆270Updated last year
- Training in Transient Execution and PhantomCALL, from Inception (SEC'23) Artifacts.☆41Updated last year
- The first analysis framework for CPU microcode☆412Updated 2 years ago
- ☆273Updated 10 months ago
- easylkb - Easy Linux Kernel Builder☆386Updated last week
- Damn Vulnerable UEFI☆298Updated last year
- ☆1,506Updated 3 years ago
- Kernel exploitation technique☆582Updated 2 years ago
- ☆417Updated this week
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆243Updated last year
- 📡🐧 Linux kernel syscall implementation tracker☆268Updated 4 months ago
- io_uring based rootkit☆249Updated 9 months ago
- The xx file format. Turn your hex dumps into art, then into binary data.☆347Updated 2 years ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆795Updated 3 years ago
- Low-Level Software Security for Compiler Developers☆601Updated 2 months ago
- A Course in Cryptanalysis☆149Updated last year
- ☆75Updated 5 months ago
- Linux Kernel Runtime Guard☆571Updated last week
- Lightweight fuzzing of a memory snapshot using KVM☆461Updated last year
- Artifacts for "ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms" (USENIX Security '24).☆59Updated 7 months ago
- ☆424Updated last year
- A collection of Ghidra scripts, including the GPT-3 powered code analyser and annotator, G-3PO.☆311Updated 2 years ago
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆175Updated 6 months ago
- ☆470Updated 3 months ago