This repo includes the artifacts for the NDSS 2025 paper "Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China": https://gfw.report/publications/ndss25/en/
☆52Mar 6, 2025Updated last year
Alternatives and similar repositories for ndss25-wallbleed
Users that are interested in ndss25-wallbleed are comparing it to the libraries listed below
Sorting:
- Cybersecurity Psychology Framework☆20Feb 22, 2026Updated 2 weeks ago
- ☆11Jul 15, 2024Updated last year
- ☆14Jul 9, 2024Updated last year
- Microsoft Developer Blogs Search Tool☆25Apr 24, 2025Updated 10 months ago
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- Exhaustive search and flexible filtering of Active Directory ACEs.☆75Nov 10, 2025Updated 3 months ago
- ☆29May 13, 2018Updated 7 years ago
- Minimal setup to trigger the xz backdoor☆29Oct 19, 2024Updated last year
- A simple Meterpreter stager written in Rust.☆45Nov 2, 2025Updated 4 months ago
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆77Sep 8, 2025Updated 6 months ago
- Ludus FastMCP enables AI-powered management of Ludus cyber ranges through natural language commands. The server exposes **157 tools** acr…☆73Dec 31, 2025Updated 2 months ago
- Binary Exploitation Phrack CTF Challenge☆70Aug 21, 2025Updated 6 months ago
- Circuit PSI using garbled cuckoo filter☆11Dec 21, 2022Updated 3 years ago
- Parses BGP/AS data from multiple different sources☆11Dec 4, 2021Updated 4 years ago
- ☆13Jan 28, 2026Updated last month
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- Federal Cloud Computing Strategy Website☆15Oct 6, 2022Updated 3 years ago
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated 2 months ago
- Open Source License Compliance Checklists☆11Oct 18, 2024Updated last year
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- Serialize ngraph.graph to binary format☆10Oct 9, 2025Updated 5 months ago
- ☆12Apr 15, 2025Updated 10 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Dec 7, 2019Updated 6 years ago
- Schedule Conflict Resolver☆13Nov 27, 2017Updated 8 years ago
- This AppEngine sample application is designed to process your Waze CCP JSON Feed into; BigQuery GIS tables for analysis, Google Cloud Sto…☆11Dec 12, 2023Updated 2 years ago
- (SIGIR 25) Repo for "Review-driven Personalized Preference Reasoning with Large Language Models for Recommendation"☆10Jan 18, 2025Updated last year
- ☆20Sep 11, 2025Updated 5 months ago
- Argument Mining Python implementation☆13Jul 28, 2023Updated 2 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- ☆10May 12, 2022Updated 3 years ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Nov 17, 2025Updated 3 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 10 months ago
- QEMU support for a custom board based on a Microchip ATSAMD21G18A microcontroller (MCU)☆14Jun 10, 2024Updated last year
- [PACT'24] GraNNDis. A fast and unified distributed graph neural network (GNN) training framework for both full-batch (full-graph) and min…☆10Aug 13, 2024Updated last year
- A list of backdoor samples I find online.☆13Dec 16, 2019Updated 6 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- ☆13Mar 1, 2024Updated 2 years ago