flowyroll / downfallLinks
☆325Updated 2 years ago
Alternatives and similar repositories for downfall
Users that are interested in downfall are comparing it to the libraries listed below
Sorting:
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆485Updated 2 years ago
- ☆452Updated 3 years ago
- Next-gen Rowhammer fuzzer that uses non-uniform, frequency-based patterns (IEEE S&P '22).☆238Updated last year
- ☆112Updated 2 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆172Updated last year
- GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers -- USENIX Security'24☆268Updated last year
- ☆105Updated 2 years ago
- Training in Transient Execution and PhantomCALL, from Inception (SEC'23) Artifacts.☆39Updated last year
- easylkb - Easy Linux Kernel Builder☆358Updated last year
- The first analysis framework for CPU microcode☆401Updated 2 years ago
- ☆272Updated 7 months ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆241Updated last year
- 📡🐧 Linux kernel syscall implementation tracker☆228Updated 3 weeks ago
- Kernel exploitation technique☆578Updated last year
- This repository contains exploit and reverse-engineering source code regarding the Spectre-BHB/Branch History Injection vulnerability☆117Updated 3 years ago
- ☆466Updated 2 weeks ago
- Damn Vulnerable UEFI☆292Updated last year
- CVE-2022-32947 walkthough and demo☆185Updated 2 years ago
- ☆1,503Updated 3 years ago
- 🌐🐧 Browsable Linux kernel syscall tables built with Systrack (https://github.com/mebeim/systrack)☆202Updated 3 weeks ago
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,367Updated 8 months ago
- A blazing fast™ multithreaded ROP Gadget finder. ropper / ropgadget alternative (currently x86 only)☆530Updated 4 months ago
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆235Updated last year
- ☆407Updated last week
- ☆641Updated 6 months ago
- XZ backdoor reverse engineering☆98Updated last year
- Linux Kernel Runtime Guard☆537Updated last week
- io_uring based rootkit☆239Updated 6 months ago
- The xx file format. Turn your hex dumps into art, then into binary data.☆345Updated 2 years ago
- Spectre based on Linear Address Masking☆68Updated last year