geesun / arm64_rop_jopLinks
Example Jop and Rop attack at Arm aarch64 platform
☆10Updated 5 years ago
Alternatives and similar repositories for arm64_rop_jop
Users that are interested in arm64_rop_jop are comparing it to the libraries listed below
Sorting:
- ☆170Updated 11 months ago
- ☆38Updated 3 years ago
- Pre-Silicon Hardware Fuzzing Toolkit☆60Updated 4 months ago
- ☆60Updated last month
- Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel☆58Updated last year
- FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution☆22Updated 2 years ago
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆82Updated last month
- Linux Kernel Fuzzer Corpus☆154Updated this week
- ☆42Updated 2 years ago
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆62Updated 3 years ago
- Revizor - Hardware fuzzing for the age of speculation☆168Updated last week
- SyzTrust's main repository. Start here to install.☆17Updated last year
- μSBS: Static Binary Sanitization of Bare-metal Embedded Devices☆33Updated 3 years ago
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆60Updated last year
- InSpectre Gadget: in-depth inspection and exploitability analysis of Spectre disclosure gadgets☆58Updated last month
- ☆63Updated last year
- Proof-of-concept implementation for the paper "Osiris: Automated Discovery of Microarchitectural Side Channels" (USENIX Security'21)☆64Updated 6 months ago
- Rage Against The Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks☆24Updated 4 years ago
- NDSS 2020 - HYPER-CUBE: High-Dimensional Hypervisor Fuzzing☆65Updated 2 years ago
- ☆30Updated last year
- A Framework for fuzzing USB Drivers by Device Emulation☆127Updated 4 years ago
- Tool for testing and finding minimal eviction sets☆107Updated 4 years ago
- Source code of ASAN--☆102Updated last year
- Fuzzing Secure Monitor Implementations☆17Updated last year
- Website and PoC collection for transient execution attacks☆200Updated last year
- The top repository for the code accompanying our paper "Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Executi…☆15Updated 3 years ago
- ☆47Updated 3 years ago
- K-Miner☆74Updated 6 years ago
- An awesome & curated list of binary rewriting papers☆256Updated 3 years ago
- SymQEMU: Compilation-based symbolic execution for binaries☆365Updated 7 months ago